Server Component Details | Group: io.mosip.hotlist ---- Artifact: hotlist-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.admin ---- Artifact: admin-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-auditmanager-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-auth-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.biosdk ---- Artifact: biosdk-services ---- version: 1.2.0.1 ---- Commit ID: 2a87b3b Group: io.mosip.idrepository ---- Artifact: credential-service ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: credential-request-generator ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.datashare ---- Artifact: data-share-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.authentication ---- Artifact: authentication-service ---- version: 1.2.1.0 ---- Commit ID: 86640e4 Group: io.mosip.authentication ---- Artifact: authentication-internal-service ---- version: 1.2.1.0 ---- Commit ID: 86640e4 Group: io.mosip.authentication ---- Artifact: authentication-otp-service ---- version: 1.2.1.0 ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: id-repository-identity-service ---- version: 1.2.2.0 ---- Commit ID: 821bac2 Group: io.mosip.kernel ---- Artifact: kernel-keymanager-service ---- version: 1.3.0-beta.3 ---- Commit ID: d748ead Group: io.mosip.kernel ---- Artifact: kernel-masterdata-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-notification-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-otpmanager-service ---- version: 1.2.0.1 ---- Commit ID: 50926c8 Group: io.mosip.pms ---- Artifact: partner-management-service ---- version: 1.3.0-SNAPSHOT ---- Commit ID: d748ead Group: io.mosip.pms ---- Artifact: policy-management-service ---- version: 1.3.0-SNAPSHOT ---- Commit ID: d748ead Group: io.mosip.preregistration.captcha ---- Artifact: pre-registration-captcha-service ---- version: 1.2.0.1 ---- Commit ID: 4e9e71f Group: io.mosip.registrationprocessor ---- Artifact: registration-processor-registration-status-service ---- version: 1.2.0.2 ---- Commit ID: 50926c8 Group: io.mosip.resident ---- Artifact: resident-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.kernel ---- Artifact: kernel-syncdata-service ---- version: 1.2.1.1 ---- Commit ID: 50926c8 Group: io.mosip.idrepository ---- Artifact: id-repository-vid-service ---- version: 1.2.2.0 ---- Commit ID: 50926c8 Group: io.mosip.esignet ---- Artifact: esignet-service ---- version: 1.4.1 ---- Commit ID: ab88802 | End Points used |
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=928382
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?model={model}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?make={make}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/{policyGroupId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}&sortType={sortType}&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&certificateId=fd0e8be0-9499-448e-9b85-06d5649c3f0e
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}/group/{policygroupId}/publish
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?apiKeyLabel=InvalidAPIKey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/oauth/client
Domain: api-internal.qa-core.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/internal/useridPwd
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?sbiId=PMS-SBI
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/trust-chain-certificates?pageNo=0&pageSize=8&issuedTo=PMS_API_CA&issuedBy=PMS_API_CA
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?certificateUploadStatus=not_uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/users/{userId}/notifications-seen-timestamp
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=desc&certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?expiryPeriod=15
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?expiryPeriod=10
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/devicedetails/map/remove
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/pms-111999/contact/add
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications/{notificationId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=-1&sortType=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=apikey&apiKeyName=%2APMS121
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=orgName&sortType=ASC&pageNo=0&pageSize=8&orgName=partner
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?emailAddress=2t63t@@@
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?status=activated
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey/request/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v2/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortType=3@@#&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/Tech-1233/policy/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceId={deviceId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=123456
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageNo=111111
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerType={partnerType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?policyGroupName={policyGroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=desc&pageSize=8&partnerType=Auth
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/system-config
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=orgName&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?model={model}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/trust-chain-certificates
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/auth-partners-policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyGroupName=testmosip12121
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageNo=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/1hhggg9/policy/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&partnerDomain=AUTH
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?partnerId=%252APMS
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyName=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?orgName=%2APMS-1100
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=4&issuedTo=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=asc&certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?apiKeyLabel=s
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortType=&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/{ftmId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&ftmId=342342
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/{sbiId}/devices
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/policy-groups
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageSize=8&isActive=true
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/partner-certificates-details
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/pms-111999
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/all
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/group/new
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misps/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=partnerId&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=_partnerID&sortType=asc&pageNo=1&pageSize=1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?requestDetails={requestDetails}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/trust-chain-certificates/fc201582-1735-4695-805a-b4d46d44ebc1/certificateFile
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/apikey/request
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/upload
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerType=dfdgd
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?status=deactivated
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&policyName=PMS-test
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyGroupName=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/certificate-data
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/devicedetails/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/deviceType/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=ab-102-13881
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=-22
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=16&expiryDate=881718821
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/search
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=16&expiryDate=07-04-2025
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/users/user-consent
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/oauth/client/{client_id}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/partnertype/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=weekly&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/certificate/ca/upload
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?policyGroupName=-12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceType={deviceType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=2
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=MOSIP_PMS
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerId=bcbcb
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/uploadcertificate
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyGroupName={policyGroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sbiId={sbiId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/getPartnerCertificate/{ftpChipDetailId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?make={make}&model={model}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageNo=2&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/deviceSubType/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyId={policyId}&policyName={policyName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/roles
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/certificate
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?partnerId={partnerId}&requestDetails={requestDetails}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=_%2ASBI
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sbiVersion={sbiVersion}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortType=asc&certificateUploadStatus=uploaded
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?emailAddress=454646
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerType=2233ddd
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey/search
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/{sbiId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?status={status}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=ftm-chip&sbiId=12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?partnerId=pms-111999
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?policyGroupName=
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}/group/{policygroupId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&ftmId=12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?policyId={policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misps/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?isActive=false
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?orgName=PMS
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/Tech-1231234
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sbiId={sbiId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?orgName=123@1sse
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyDescription={policyDescription}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v2
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}/partner/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?expiryPeriod=30
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=8
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/deviceType/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?policyName=testmosip1212
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=8&certificateId=777apple123
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=asc&pageSize=8&partnerType=Auth
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/apikey/request/filtervalues
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&partnerType=FTM_Provider
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/config/{key}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-policy-requests?pageNo={pageNo}&pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: authmanager ---- End Point: v1/authmanager/authenticate/clientidsecretkey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys?apiKeyLabel={apiKeyLabel}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/pms-111999/policy/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?pageSize=-12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/ftpchipdetail/v2?orgName={orgName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners/{partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/email/verify
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/{deviceId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationStatus=active&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageSize=16&issuedBy=mosip
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misps/{mispId}/licenseKey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/apikey/{apiKey}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?make={make}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/Tech-123
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?sortFieldName=a2a33
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?pageSize={pageSize}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageNo=-22&pageSize=2
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyGroupName={policyGroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/admin-partners?partnerId=-dndn333
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/policy/{mappingkey}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/MOVP-AUTOMATION/policy/map
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=-4
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?pageNo={pageNo}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partner-api-keys/v2?pageNo=1&pageSize=-1
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=07-04-2025
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?partnerId={partnerId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/partners/pms-111999/generate/apikey
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/securebiometricinterface?sortType={sortType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/v2?policyId={policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=07-04-2025
Domain: api-internal.qa-core.mosip.net ---- Module: policymanager ---- End Point: v1/policymanager/policies/{policyId}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?notificationType=sbi&apiKeyName=12
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/misps
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?deviceSubType={deviceSubType}
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/notifications?policyName=PMS-test
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail/{deviceDetailId}/approval
Domain: api-internal.qa-core.mosip.net ---- Module: partnermanager ---- End Point: v1/partnermanager/devicedetail?make={make}&model={model} | |||||
|---|---|---|---|---|---|---|---|---|
Server Errors No server errors | ||||||||
Captcha Enabled false | ||||||||
| Partner Management Service API Test ---- Report Date: 2025-09-02 ---- Tested Environment: qa-core ---- Commit Id is: 4f8aff40 & Branch Name is:release-1.3.x | ||||||||
| Test Scenario | # Total | # Passed | # Skipped | # Failed | # Ignored | # Known_Issues | Execution Time (HH:MM:SS) | |
| CreatePolicyGroup | 19 | 19 | 0 | 0 | 0 | 0 | 00:00:03 | |
| GetPolicyGroup | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePolicyGroup | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivatePolicyGroupBeforePolicyCreation | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DefinePolicy | 29 | 29 | 0 | 0 | 0 | 0 | 00:00:04 | |
| DefineDataSharePolicy | 25 | 25 | 0 | 0 | 0 | 0 | 00:00:03 | |
| UpdatePolicy | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePolicyStatus | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PublishPolicy | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllActivePolicyGroups | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPolicy | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SearchPolicy | 21 | 21 | 0 | 0 | 0 | 0 | 00:00:02 | |
| PrintPartner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificatePrintPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadPartnerCertificatePrintPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePrintPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPrintPartnerDetails | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerWithoutPartnerRegister | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedPartnerIdBeforePartnerCreate | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreatePartner | 20 | 20 | 0 | 0 | 0 | 0 | 00:00:03 | |
| CreatePartner_Online_Verification_Partner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerWithoutPartnerCertifcates | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| VerifyPartnersEmail | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerExpiringCertificateBeforeCertificateUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificate | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:02 | |
| GetAllCertificateBeforeCACertificateUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalPartnerCertificatesBeforeCertificateUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadPartnerCertificate | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:06 | |
| GetPartnerCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePartner | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificate_Online_Verification_Partner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadPartnerCertificate_Online_Verification_Partner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:02 | |
| GetPartnerDetails_Online_Verification_Partner | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerCertificate_Online_Verification_Partner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedPartnerId | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedPartnerIdWithoutAuthentication | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerBeforePolicyMapping | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRequestedPolicyBeforeMapping | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AddAdditionalContact | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| partnerPolicyMapping | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AddBioExtractors | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingKey | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingKey | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRequestedPolicy | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRequestedPolicyAuthvalidations | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedAuthPartnerPolicy | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedAuthPartnerPolicyAuthValidations | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerBeforeApikeyGenerated | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GenerateApiKey | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ActivateDeactivatePartnerApiKey | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| InsertDBData | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartner | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerAfterDeactive | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllPartnerPolicyRequest | 16 | 16 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllPartnerPolicyRequestNegativeScenarios | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfPartners | 35 | 35 | 0 | 0 | 0 | 0 | 00:00:23 | |
| GetDetailsOfPartner | 8 | 8 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfPolicies | 21 | 21 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfPoliciesRequest | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClientBeforeOIDCCreation | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| OAuthClient | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:08 | |
| GetAllOauthClient | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateOAuthClient | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClient | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClientWithoutAuthentication | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateOIDCClient | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllOidcClientAfterDeactivateOfOIDC | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetConfiguration | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetUserConsentBeforeConsentGiven | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| saveUserConsent | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetUserConsent | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalPartnerCertificates | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreatePartner_MISP_Provider | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCACertificate_MISP_Provider | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:02 | |
| UploadPartnerCertificate_MISP_Provider | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:05 | |
| GetPartnerDetails_MISP_Provider | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerCertificate_MISP_Provider | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateDeviceDetail | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectDeviceDetail | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveDeviceDetail | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateDeviceDetail | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeviceDetailsFilter | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| createSearchDeviceType | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:01 | |
| createSearchDeviceDetails | 11 | 11 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllSBIBeforeAddingSBI | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SaveSecureBiometricInterfaceCreateDto | 10 | 10 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectSecureBiometricInterface | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveSecureBiometricInterface | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateSecureBiometricInterface | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| createSearchSecureBiometric | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedDeviceProviderIds | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedDeviceProviderIdsNegativeScenarios | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateSBIID | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetSbiDetailsList | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeviceTypeFilter | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeviceSubTypeFilter | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SaveDeviceDetails | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllSBI | 18 | 18 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ServiceToFilterSBI | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| MapDeviceWithSBI | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RemoveMapDeviceWithSBI | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbi | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbiNegativeScenarios | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingDeviceToSbi | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingDeviceToSbiwhichisRejected | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectMappingDeviceToSbiNegativeScenarios | 32 | 32 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbiwhichisRejected | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllDeviceListMappedWithSbi | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllDeviceListMappedWithSbiNegativeScenarios | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateSBIwhichisPendingforApproval | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnersPolicy | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllPolicyGroup | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:03 | |
| CreateSearchPolicyGroup | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PolicyGroupFilter | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetValueForConfigKey | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| PartnerFilter | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SearchPartnerApiKey | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:03 | |
| SearchPartnerApiRequestKey | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:11 | |
| PartnerApiKeyRequestFilter | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateSearchPartnerType | 19 | 19 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedFtmProvider | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApprovedFtmProviderNegativeScenarios | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListAllFTMChipNegativeScenarios | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateFtmChipDetails | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateFtpChipDetail | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteNegativeScenariosBeforeUploadCert | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtmwhichisPendingforCertUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteforPendingforCertUpload | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UploadCertificateOfFtpChip | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtmwhichisPendingforApproval | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveFTMChipDetail | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| RejectFtpChipDetail | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetFTPChipDetail | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListAllFTMChip | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacte | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteNegativeScenarios | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfFtmChip | 15 | 15 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfFtmChipNegativeScenarios | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllSBINegativeScenarios | 14 | 14 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfAllDevice | 25 | 25 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetCountOfFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllSystemConfigs | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllRootCertificate | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetListOfApiKey | 17 | 17 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DownloadRootCertificate | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateMispLicense | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetMispLicense | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateMispLicense | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetMISPLicenseByMispID | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| SearchMispLicense | 7 | 7 | 0 | 0 | 0 | 0 | 00:00:01 | |
| FilterMispLicense | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerApiKeyRequest | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetBioExtractors | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| CreateBioExtractors | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| MapPartnerAndPolicytoCredentialType | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPolicyforMappedPartnerAndCredentialtype | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetRoles | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ActivateDeactivatePartner | 6 | 6 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetApiKeyRequests | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuditLogGenerateApiKey | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:28 | |
| GetPolicyForApiKey | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdatePolicyAgainstApiKey | 5 | 5 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuditLogPartnerApiKey_ | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:06 | |
| UpdatePolicyGroupForPartner | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| AuditLogUpdatePolicyGroupForPartner | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:06 | |
| DBValidator | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateDevice | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateDeviceNegativeScenarios | 9 | 9 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateSBIWithAssociatedDevices | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateSBIWithAssociatedDevicesNegativeScenarios | 20 | 20 | 0 | 0 | 0 | 0 | 00:00:01 | |
| ApproveMappingDeviceToSbiwhenSBIisDeactivated | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivateFtmNegativeScenarios | 18 | 18 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetOriginalFtmCertifacteAfterDeactiveFtm | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivatePolicy | 13 | 13 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DeactivatePolicyGroup | 17 | 17 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllNotifications | 40 | 40 | 0 | 0 | 0 | 0 | 00:00:01 | |
| DismissNotificationNegativeScenarios | 19 | 19 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateNotificationSeenTimestamp | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| UpdateNotificationSeenTimestampNegativeScenarios | 18 | 18 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetNotificationsSeenTimestamp | 1 | 1 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetNotificationsSeenTimestampNegativeScenarios | 3 | 3 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerExpiringCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetPartnerExpiringCertificateNegativeScenarios | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetRootIntermediateExpiringCertificate | 4 | 4 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetRootIntermediateExpiringCertificateNegativeScenarios | 2 | 2 | 0 | 0 | 0 | 0 | 00:00:01 | |
| GetAllApiKeyForAuthPartnerV2 | 16 | 16 | 0 | 0 | 0 | 0 | 00:00:03 | |
| GetAllApiKeyForAuthPartnerV2NegativeScenarios | 14 | 14 | 0 | 0 | 0 | 0 | 00:00:01 | |
| Total | 1,068 | 1,068 | 0 | 0 | 0 | 0 | 00:03:02 | |
| TestCase Number | TestCase Description | Execution Time (HH:MM:SS) |
|---|---|---|
| CreatePolicyGroup — Passed | ||
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_11 | Creating a PolicyGroup for draft policy | 00:00:01 |
| TC_PMS_definePolicyGroup_10 | Creating a PolicyGroup for published policy | 00:00:01 |
| TC_PMS_definePolicyGroup_11 | Creating a PolicyGroup for draft policy | 00:00:01 |
| TC_PMS_definePolicyGroup_09 | Creating a PolicyGroup for deactivate policy | 00:00:01 |
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:02 |
| TC_PMS_definePolicyGroup_02 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_08 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_04 | Creating a Policy Group | 00:00:01 |
| TC_PMS_definePolicyGroup_05 | Creating a Policy Group | 00:00:01 |
| TC_PMS_definePolicyGroup_06 | Creating a policy group with missing request time | 00:00:01 |
| TC_PMS_definePolicyGroup_03 | Creating a PolicyGroup with invalid request time | 00:00:01 |
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_07 | Creating a policy group | 00:00:01 |
| Pms_DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid | Creating a PolicyGroup | 00:00:01 |
| Pms_DefinePolicyGroup_create_then_deactivateAll_Valid_Smoke_pms_sid | Creating a PolicyGroup | 00:00:01 |
| TC_PMS_definePolicyGroup_01 | Creating a PolicyGroup | 00:00:01 |
| GetPolicyGroup — Passed | ||
| TC_PMS_getPolicyGroup_01 | Retrieve Parter Policy Group | 00:00:01 |
| TC_PMS_getPolicyGroup_02 | Retrieve Parter Policy Group with invalid PolicyGroupId | 00:00:01 |
| UpdatePolicyGroup — Passed | ||
| TC_PMS_updatePolicyGroup_02 | Update Policy Group with valid details | 00:00:01 |
| TC_PMS_updatePolicyGroup_04 | Update Policy Group while keeping PolicyGroupID parameter as invalid | 00:00:01 |
| TC_PMS_updatePolicyGroup_05 | Update Policy Group while keeping PolicyGroupID parameter as missing and filter data in descending order | 00:00:01 |
| TC_PMS_updatePolicyGroup_07 | Update Policy Group while keeping isActive parameter as missing | 00:00:01 |
| TC_PMS_updatePolicyGroup_06 | Update Policy Group while keeping Name parameter as missing | 00:00:01 |
| TC_PMS_updatePolicyGroup_03 | Update Policy Group as Activate with valid details | 00:00:01 |
| TC_PMS_updatePolicyGroup_01 | Update Policy Group as Deactivate with valid details | 00:00:01 |
| DeactivatePolicyGroupBeforePolicyCreation — Passed | ||
| TC_PMS_DeactivatePolicyGroupBeforePolicyCreation_01 | Deactivate Policy Group before policy is created | 00:00:01 |
| DefinePolicy — Passed | ||
| TC_PMS_definePolicy_29 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_31 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_28 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_30 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_06 | Define Policy for invalid AuthTypeToken | 00:00:01 |
| TC_PMS_definePolicy_05 | Define Policy For invalid AuthTypeToken | 00:00:01 |
| TC_PMS_definePolicy_03 | Define Policy for auth token type null | 00:00:01 |
| TC_PMS_definePolicy_04 | Define policy for authtoken type policy | 00:00:01 |
| TC_PMS_definePolicy_08 | Define Policy for AuthTypeToken space | 00:00:01 |
| TC_PMS_definePolicy_27 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_02 | Get API key for deactivated SID | 00:00:01 |
| TC_PMS_definePolicy_01 | Creating a Policy using PolicyGroup | 00:00:01 |
| TC_PMS_definePolicy_10 | Define Policy with same policyname | 00:00:01 |
| TC_PMS_definePolicy_19 | Define Policy without authtoken type | 00:00:01 |
| TC_PMS_definePolicy_18 | Define policy without authtype | 00:00:01 |
| TC_PMS_definePolicy_16 | Define policy withput input parameter | 00:00:01 |
| TC_PMS_definePolicy_17 | Define policy | 00:00:01 |
| TC_PMS_definePolicy_15 | Define policy missing input parameter | 00:00:01 |
| TC_PMS_definePolicy_21 | Define Policy without policygroupname | 00:00:01 |
| TC_PMS_definePolicy_22 | Define policy without policy type | 00:00:01 |
| TC_PMS_definePolicy_14 | Define policy for Inactive policy group | 00:00:01 |
| TC_PMS_definePolicy_13 | Define policy for non existing policygroup | 00:00:01 |
| TC_PMS_definePolicy_09 | Define Policy for random AuthTypeToken | 00:00:01 |
| TC_PMS_definePolicy_11 | Define Policy without demo | 00:00:01 |
| TC_PMS_definePolicy_26 | Define policy | 00:00:01 |
| TC_PMS_definePolicy_24 | Define policy with invalid authtokentype | 00:00:01 |
| TC_PMS_definePolicy_25 | Define policy without authtoken type | 00:00:01 |
| TC_PMS_definePolicy_23 | Define policy without authtoken type | 00:00:01 |
| TC_PMS_definePolicy_07 | DefinePolicy without AuthTypeToken | 00:00:01 |
| DefineDataSharePolicy — Passed | ||
| TC_PMS_defineDataSharePolicy_01 | Create Data Share Policy with valid details | 00:00:01 |
| TC_PMS_defineDataSharePolicy_03 | Create Data Share Policy for update partner | 00:00:01 |
| TC_PMS_defineDataSharePolicy_02 | Create Data Share Policy for requested API Key | 00:00:01 |
| TC_PMS_defineDataSharePolicy_23 | Create Data Share Policy while keeping AttributeName parameter as custome name value | 00:00:01 |
| TC_PMS_defineDataSharePolicy_24 | Create Data Share Policy while Cancelling the created dataSharePolicy | 00:00:01 |
| TC_PMS_defineDataSharePolicy_22 | Create Data Share Policy while keeping EncryptionType parameter as none value | 00:00:01 |
| TC_PMS_defineDataSharePolicy_07 | Create Data Share Policy for inactive Policy Group | 00:00:01 |
| TC_PMS_defineDataSharePolicy_16 | Create Data Share Policy while keeping attributeName parameter as IndividualBiometrics | 00:00:01 |
| TC_PMS_defineDataSharePolicy_14 | Create Data Share Policy while keeping AttributeName parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_04 | Create Data Share Policy To check status | 00:00:01 |
| TC_PMS_defineDataSharePolicy_05 | Create Data Share Policy Without Mandatory Fields | 00:00:01 |
| TC_PMS_defineDataSharePolicy_17 | Create Data Share Policy while keeping attributeName parameter as Zipcode | 00:00:01 |
| TC_PMS_defineDataSharePolicy_06 | Create Data Share Policy with duplicate Policy name | 00:00:01 |
| TC_PMS_defineDataSharePolicy_15 | Create Data Share Policy while keeping Format parameter with spaces value | 00:00:01 |
| TC_PMS_defineDataSharePolicy_08 | Create Data Share Policy while keeping invalid Policy Group name | 00:00:01 |
| TC_PMS_defineDataSharePolicy_09 | Create Data Share Policy while keeping invalid Policy Type | 00:00:01 |
| TC_PMS_defineDataSharePolicy_12 | Create Data Share Policy while keeping Policy Group Name parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_13 | Create Data Share Policy while keeping Policy Type parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_11 | Create Data Share Policy while keeping description parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_10 | Create Data Share Policy while keeping name parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_21 | Create Data Share Policy while keeping shareDomain parameter as https | 00:00:01 |
| TC_PMS_defineDataSharePolicy_19 | Create Data Share Policy while keeping typeOfShare parameter as Direct value | 00:00:01 |
| TC_PMS_defineDataSharePolicy_20 | Create Data Share Policy while keeping typeOfShare parameter as Empty | 00:00:01 |
| TC_PMS_defineDataSharePolicy_18 | Create Data Share Policy while keeping typeofShare parameter with spaces value | 00:00:01 |
| TC_PMS_defineDataSharePolicy_25 | Create Data Share Policy without PolicyId | 00:00:01 |
| UpdatePolicy — Passed | ||
| TC_PMS_createUpdatePolicy_06 | Update Policy while keeping InputParameter as invalid for PolicyID | 00:00:01 |
| TC_PMS_createUpdatePolicy_02 | Update Policy with invalid PolicyID | 00:00:01 |
| TC_PMS_createUpdatePolicy_03 | Update Policy with invalid PolicyGroupName | 00:00:01 |
| TC_PMS_createUpdatePolicy_07 | Update Policy while keeping authTokeType Parameter as Empty | 00:00:01 |
| TC_PMS_createUpdatePolicy_05 | Update Policy while keeping InputParameter as empty | 00:00:01 |
| TC_PMS_createUpdatePolicy_04 | Update Policy with invalid PolicyParameterName | 00:00:01 |
| TC_PMS_createUpdatePolicy_08 | Update Policy while keeping PolicyGroupName Parameter as Empty | 00:00:01 |
| UpdatePolicyStatus — Passed | ||
| TC_PMS_UpdatePolicyStatus_04 | Update Policy Status as Active with invalid data | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_01 | Update Policy Status as DeActive | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_03 | Update Policy Status as DeActive for datashare | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_08 | Update Policy Status while keeping status parameter as empty | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_07 | Update Policy Status while keeping PolicyGroupId parameter as invalid | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_05 | Update Policy Status as Active with invalid PolicyID | 00:00:01 |
| TC_PMS_UpdatePolicyStatus_06 | Update Policy Status while keeping status parameter as invalid | 00:00:01 |
| PublishPolicy — Passed | ||
| Partner_PublishDataSharePolicy_All_Valid_Smoke | 00:00:01 | |
| Pms_PublishPolicy_All_Valid_ForInProgressPolicyMapping | Publish The Policy for rejecting partner policy mapping request | 00:00:01 |
| Pms_PublishPolicy_All_Valid_ForRejectPolicyMapping | Publish The Policy for rejecting partner policy mapping request | 00:00:01 |
| Pms_PublishPolicy_All_Valid_Smoke | Publish The Policy | 00:00:01 |
| Pms_PublishPolicy_All_Valid_Smoke_ForNeg | Publish The Policy | 00:00:01 |
| Pms_PublishPolicy_All_Valid_forDeactivatePolicyGroup_ForNeg | Publish The Policy for deactivate policy group with published policy | 00:00:01 |
| Pms_PublishPolicy_ForDeactive_All_Valid_Smoke | Publish The Policy | 00:00:01 |
| Pms_PublishPolicy_InValid_AlreadyPublished_neg | Publish The Policy which is already published | 00:00:01 |
| Pms_PublishPolicy_InValid_policyId_neg | Publish The Policy with invalid policyid | 00:00:01 |
| Pms_PublishPolicy_InValid_policygroupId_neg | Publish The Policy with invalid policygroupid | 00:00:01 |
| Pms_PublishPolicy_invalid_auth_neg | Publish The Policy without access token | 00:00:01 |
| GetAllActivePolicyGroups — Passed | ||
| TC_PMS_GetAllActivePolicyGroups_01 | Fetching all the active PolicyGroups | 00:00:01 |
| TC_PMS_GetAllActivePolicyGroups_03 | Fetching all the active PolicyGroups with invalid token | 00:00:01 |
| TC_PMS_GetAllActivePolicyGroups_02 | Fetching all the active PolicyGroups without token | 00:00:01 |
| GetPolicy — Passed | ||
| TC_PMS_getPolicy_01 | Retrieve Parter Policy | 00:00:01 |
| TC_PMS_getPolicy_02 | Retrieve Parter Policy with invalid PolicyId | 00:00:01 |
| SearchPolicy — Passed | ||
| TC_PMS_createSearchPartner_01 | Create Search Policy with valid details | 00:00:01 |
| TC_PMS_createSearchPartner_03 | Create Search Policy with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchPartner_05 | Create Search Policy with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchPartner_04 | Create Search Policy with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchPartner_02 | Create Search Policy with valid details | 00:00:01 |
| TC_PMS_createSearchPartner_06 | Create Search Policy while keeping Type parameter as contains and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPartner_07 | Create Search Policy while keeping Type parameter as contains and filter the data in descending order | 00:00:01 |
| TC_PMS_createSearchPartner_09 | Create Search Policy while keeping Type parameter as Equals and filter the data in ascending order | 00:00:01 |
| TC_PMS_createSearchPartner_08 | Create Search Policy while keeping Type parameter as Equals and filter the data in descending order | 00:00:01 |
| TC_PMS_createSearchPartner_10 | Create Search Policy while keeping Type parameter as Startswith and filter the data in ascending order | 00:00:01 |
| TC_PMS_createSearchPartner_11 | Create Search Policy while keeping Type parameter as Startswith and filter the data in descending order | 00:00:01 |
| TC_PMS_createSearchPartner_15 | Create Search Policy while keeping columnName parameter | 00:00:01 |
| TC_PMS_createSearchPartner_20 | Create Search Policy while keeping sortField parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartner_18 | Create Search Policy while keeping sortType parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartner_12 | Create Search Policy while keeping value parameter as invalid and filter the data in descending order | 00:00:01 |
| TC_PMS_createSearchPartner_13 | Create Search Policy while keeping value parameter as invalid and Type parameter as Equals | 00:00:01 |
| TC_PMS_createSearchPartner_14 | Create Search Policy while keeping value parameter as invalid and Type parameter as startswith | 00:00:01 |
| TC_PMS_createSearchPartner_16 | Create Search Policy while keeping columnName parameter as Empty | 00:00:01 |
| TC_PMS_createSearchPartner_21 | Create Search Policy while keeping sortField parameter as Empty | 00:00:01 |
| TC_PMS_createSearchPartner_19 | Create Search Policy while keeping sortType parameter as Empty | 00:00:01 |
| TC_PMS_createSearchPartner_17 | Create Search Policy while keeping Type parameter as Empty | 00:00:01 |
| PrintPartner — Passed | ||
| TC_PMS_createPartnerSelfRegistration_01 | Create Print Partner Self Registration with valid details | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_02 | Create Print Partner Self Registration with duplicate Email | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_03 | Create Print Partner Self Registration while keeping SpaceIn PartnerId | 00:00:01 |
| UploadCACertificatePrintPartner — Passed | ||
| TC_PMS_uploadCert_01 | Upload valid CA Certificate for Print Partner | 00:00:01 |
| UploadPartnerCertificatePrintPartner — Passed | ||
| TC_PMS_UploadPartnerCert_01 | Upload Print Partner Certificate | 00:00:01 |
| UpdatePrintPartner — Passed | ||
| TC_PMS_UpdatePrintPartner_01 | Update Print Partner with valid details | 00:00:01 |
| GetPrintPartnerDetails — Passed | ||
| TC_PMS_GetPartnerDetails_01 | Retrieve Print Partner Details | 00:00:01 |
| GetAllApiKeyForAuthPartnerWithoutPartnerRegister — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerWithoutPartnerRegister_01 | Fetching all the API Key Without Partner Register | 00:00:01 |
| GetAllApprovedPartnerIdBeforePartnerCreate — Passed | ||
| Pms_GetAllApprovedAuthPartnerId_BeforePartnerCreate_Neg | Fetching all approved Partner Id | 00:00:01 |
| CreatePartner — Passed | ||
| TC_PMS_createPartnerSelfRegistration_10 | Create Partner Self Registrartion with Deactivated Partner ID | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_11 | Create Partner Self Registrartion with Already Existing Policy Name | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_14 | Create Partner Self Registrartion with Already Existing Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_09 | Create Partner Self Registrartion with Deactivated Partner ID | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_13 | Create Partner Self Registrartion with Policy Group | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_16 | Create Partner Self Registrartion while keeping the PartnerID parameter as missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_17 | Create Partner Self Registrartion while keeping the address parameter as missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_18 | Create Partner Self Registrartion while keeping the Contact Number parameter as missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_19 | Create Partner Self Registrartion while keeping the emailID parameter as missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_20 | Create Partner Self Registrartion while keeping the PartnerType parameter as missing | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_12 | Create Partner Self Registrartion with invalid PartnerID | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_15 | Create Partner Self Registrartion and update Policy Group for Partner with valid data | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_08 | Creating a Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_01 | Creating a Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_06 | Creating a Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_07 | Creating a Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_03 | Creating a Partner | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_04 | Creating a Partner with missing request time | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_05 | Creating a Partner with invalid request time | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_02 | Creating a Partner | 00:00:01 |
| CreatePartner_Online_Verification_Partner — Passed | ||
| TC_PMS_createPartnerSelfRegistration_01 | Create Partner self Registrartion with Valid data | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_03 | Create Partner self Registrartion with existing Email | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_02 | Create Partner self Registrartion without PartnerID | 00:00:01 |
| GetAllApiKeyForAuthPartnerWithoutPartnerCertifcates — Passed | ||
| Pms_GetAllApiKeyForAuthPartner_withoutuploadCert_Neg | Fetching all the API Key Without Partner Register | 00:00:01 |
| VerifyPartnersEmail — Passed | ||
| TC_PMS_VerifyPartnersEmail_01 | Verify Partners Email | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_03 | Verify Partners Email | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_07 | Verify Partners Email | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_06 | Verify Partners Email | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_05 | Verify Partners Email | 00:00:01 |
| TC_PMS_VerifyPartnersEmail_04 | Verify Partners Email | 00:00:01 |
| GetPartnerExpiringCertificateBeforeCertificateUpload — Passed | ||
| TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_03 | Get Partner Expiring Certificates Before Certificate Upload | 00:00:01 |
| UploadCACertificate — Passed | ||
| TC_PMS_UploadCACertificate_01 | Upload CA Cert | 00:00:01 |
| TC_PMS_UploadCACertificate_05 | Upload CA Cert which is already uploaded | 00:00:01 |
| TC_PMS_UploadCACertificate_07 | Upload CA Cert with blank data | 00:00:01 |
| TC_PMS_UploadCACertificate_06 | Upload CA Cert with invalid data | 00:00:01 |
| TC_PMS_UploadCACertificate_03 | Upload CA Cert | 00:00:01 |
| TC_PMS_UploadCACertificate_08 | Upload CA Cert | 00:00:01 |
| TC_PMS_UploadCACertificate_04 | Upload Sub-CA Cert | 00:00:01 |
| TC_PMS_UploadCACertificate_09 | Upload Sub-CA Cert | 00:00:01 |
| TC_PMS_UploadCACertificate_02 | Upload Sub-CA Cert | 00:00:01 |
| GetAllCertificateBeforeCACertificateUpload — Passed | ||
| TC_PMS_GetAllCertificateBeforeCACertificateUpload_01 | Fetching all the API certificates of the Logged in Partner | 00:00:01 |
| GetOriginalPartnerCertificatesBeforeCertificateUpload — Passed | ||
| TC_PMS_getPartner_certificate_08 | Get original Auth partner certificates before certificate upload | 00:00:01 |
| UploadPartnerCertificate — Passed | ||
| TC_PMS_uploadPartnerCert_01 | Upload Partner Cert | 00:00:01 |
| TC_PMS_uploadPartnerCert_07 | Upload partner certificate again | 00:00:02 |
| TC_PMS_uploadPartnerCert_06 | Upload Partner Cert by giving invalid domain | 00:00:01 |
| TC_PMS_uploadPartnerCert_05 | Upload Partner Cert by giving invalid cert data | 00:00:01 |
| TC_PMS_uploadPartnerCert_04 | Upload Partner Cert without partnerdomain | 00:00:01 |
| TC_PMS_uploadPartnerCert_03 | Upload Partner Cert | 00:00:01 |
| TC_PMS_uploadPartnerCert_08 | Upload Partner Cert | 00:00:01 |
| GetPartnerCertificate — Passed | ||
| Pms_GetPartnerCert_AuthPartner_All_Valid_Smoke | Fetching all the certificate for the Partner Id | 00:00:01 |
| Pms_GetPartnerCert_DeviceProvider_All_Valid_Smoke | Fetching all the certificate for the Partner Id | 00:00:01 |
| Pms_GetPartnerCert_FtmProvider_All_Valid_Smoke | Fetching all the certificate for the Partner Id | 00:00:01 |
| TC_PMS_GetPartnerCert_03 | Fetching all the certificate for the Partner Id | 00:00:01 |
| GetAllCertificate — Passed | ||
| TC_PMS_GetAllCertificate_02 | Fetching all the API certificates of the Loggedin Partner | 00:00:01 |
| TC_PMS_GetAllCertificate_01 | Fetching all the API certificates of the Logged in Partner | 00:00:01 |
| TC_PMS_GetAllCertificate_04 | Fetching all the API certificates of the partner invalid partner | 00:00:01 |
| TC_PMS_GetAllCertificate_03 | Fetching all the API certificates of the partner without login | 00:00:01 |
| UpdatePartner — Passed | ||
| TC_PMS_updatePartnerDetails_01 | Update Partner Details for Partner with valid data | 00:00:01 |
| TC_PMS_updatePartnerDetails_03 | Update Partner Details for Partner while keeping Address parameter as missing | 00:00:01 |
| TC_PMS_updatePartnerDetails_04 | Update Partner Details for Partner while keeping Contact Number parameter as missing | 00:00:01 |
| TC_PMS_updatePartnerDetails_02 | Update Partner Details for Partner with invalid partnerID | 00:00:01 |
| UploadCACertificate_Online_Verification_Partner — Passed | ||
| TC_PMS_uploadCert_01 | Upload CA Certificate for Partner | 00:00:01 |
| TC_PMS_uploadCert_02 | Upload CA Certificate for Partner with invalid certificate data | 00:00:01 |
| TC_PMS_uploadCert_03 | Upload SUBCA Certificate for Partner | 00:00:01 |
| UploadPartnerCertificate_Online_Verification_Partner — Passed | ||
| TC_PMS_uploadPartnerCert_01 | Upload valid Partner certificate for Partner | 00:00:02 |
| GetPartnerDetails_Online_Verification_Partner — Passed | ||
| TC_PMS_getPartnerCert_01 | Retreive Partner details | 00:00:01 |
| TC_PMS_getPartnerCert_02 | Retreive Partner details with invalid PartnerID | 00:00:01 |
| GetPartnerCertificate_Online_Verification_Partner — Passed | ||
| TC_PMS_getPartnerCert_01 | Retreive Partner certificate | 00:00:01 |
| GetAllApprovedPartnerId — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerId_01 | Fetching all approved Partner Id | 00:00:01 |
| GetAllApprovedPartnerIdWithoutAuthentication — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerId_02 | Fetching all approved Partner Id with invalid token | 00:00:01 |
| TC_PMS_GetAllApprovedAuthPartnerId_01 | Fetching all approved Partner Id without token | 00:00:01 |
| GetAllApiKeyForAuthPartnerBeforePolicyMapping — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerBeforePolicyMapping_01 | Fetching all the API Key Before Policy Mapping | 00:00:01 |
| GetAllRequestedPolicyBeforeMapping — Passed | ||
| TC_PMS_GetAllRequestedPolicies_01 | Fetching all the Requested Policies | 00:00:01 |
| AddAdditionalContact — Passed | ||
| TC_PMS_AddContact_01 | Create Contact details for Partner with Valid data | 00:00:01 |
| TC_PMS_AddContact_02 | Create contact details for the Partner while keeping the address parameter as missing | 00:00:01 |
| TC_PMS_AddContact_03 | Create contact details for the Partner while keeping the contactNumber parameter as missing | 00:00:01 |
| TC_PMS_AddContact_04 | Create contact details for the Partner while keeping the emailID parameter as missing | 00:00:01 |
| partnerPolicyMapping — Passed | ||
| TC_PMS_RequestAPIKeyCredentialPartner_06 | Create Partner API Key Request for Credential Partner with invalid Policy Name use case description | 00:00:01 |
| TC_PMS_RequestAPIKeyCredentialPartner_05 | Create Partner API Key Request for Credential Partner with invalid use case description | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_03 | Create Partner API Key Request for Partner with Deactivated Policy | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_04 | Create Partner API Key Request for Partner and mapping the Partner with Inprogress Policy | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_01 | Create Partner API Key Request for Partner with valid data | 00:00:01 |
| Pms_partnerPolicyMapping_All_Valid_Smoke_sid | Mapping Partner & Policy | 00:00:01 |
| TC_PMS_RequestAPIKeyForAuthPartner_02 | Mapping Partner & Policy | 00:00:01 |
| Pms_partnerPolicyMapping_ForPending_All_Valid_sid | Mapping Partner & Policy | 00:00:01 |
| Pms_partnerPolicyMapping_ForRejecting_All_Valid_sid | Mapping Partner & Policy | 00:00:01 |
| Pms_partnerPolicyMapping_invalid_partnerId_neg | Mapping Partner & Policy when invalid partnerId is given | 00:00:01 |
| Pms_partnerPolicyMapping_invalid_policyName_neg | Mapping Partner & Policy when invalid policyname is given | 00:00:01 |
| Pms_partnerPolicyMapping_missing_policyName_neg | Mapping Partner & Policy when policyname is removed from request | 00:00:01 |
| Pms_partnerPolicyMapping_missing_useCaseDescription_neg | Mapping Partner & Policy when usecaseDescription is removed from request | 00:00:01 |
| AddBioExtractors — Passed | ||
| TC_PMS_addBioExtractors_01 | Add BioExtractors for MOSIPDataSharePolicy for valid PolicyID | 00:00:01 |
| TC_PMS_addBioExtractors_02 | Add BioExtractors for MOSIP Policy for valid PolicyID | 00:00:01 |
| TC_PMS_addBioExtractors_04 | Add BioExtractors for invalid PartnerID | 00:00:01 |
| TC_PMS_addBioExtractors_03 | Add BioExtractors for invalid PolicyID | 00:00:01 |
| RejectMappingKey — Passed | ||
| TC_PMS_RejectAPIKey_02 | Update the status for Approved Partner while keeping the Status parameter as missing | 00:00:01 |
| ApproveMappingKey — Passed | ||
| Pms_ApproveMappingKey_All_Valid_Smoke | Approve the Mapping Key | 00:00:01 |
| TC_PMS_ApproveAPIKey_01 | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_Map_partner_toalready_mapped_policy_neg | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_Missing_Request_Time_Neg | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_Missing_status_Neg | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_PastDate_Request_Time_Neg | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_Reject_All_Valid | Reject the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_Rejected_All_Valid_Smoke | Approve the Mapping Key | 00:00:01 |
| Pms_ApproveMappingKey_SpaceIn_mapping_key_Neg | Approve the Mapping Key | 00:00:01 |
| GetAllRequestedPolicy — Passed | ||
| TC_PMS_GetAllRequestedPolicies_01 | Fetching all the Requested Policies | 00:00:01 |
| GetAllRequestedPolicyAuthvalidations — Passed | ||
| TC_PMS_GetAllRequestedPolicies_02 | Fetching all the Requested Policies with invalid role | 00:00:01 |
| TC_PMS_GetAllRequestedPolicies_01 | Fetching all the Requested Policies without login token | 00:00:01 |
| GetAllApprovedAuthPartnerPolicy — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerPolicy_01 | Fetching all Approved Auth Partner Policies | 00:00:01 |
| GetAllApprovedAuthPartnerPolicyAuthValidations — Passed | ||
| TC_PMS_GetAllApprovedAuthPartnerPolicy_02 | Fetching all Approved Auth Partner Policies with invalid token | 00:00:01 |
| TC_PMS_GetAllApprovedAuthPartnerPolicy_01 | Fetching all Approved Auth Partner Policies without token | 00:00:01 |
| GetAllApiKeyForAuthPartnerBeforeApikeyGenerated — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerBeforeApiKeyGenerated_01 | Fetching all the API Key Without Partner Register | 00:00:01 |
| GenerateApiKey — Passed | ||
| TC_PMS_GenerateApikey_01 | Generating an API Key | 00:00:01 |
| TC_PMS_GenerateApikey_07 | Generate Api Keys for Approved Policies with invalid policy | 00:00:01 |
| TC_PMS_GenerateApikey_03 | Generating an API Key | 00:00:01 |
| TC_PMS_GenerateApikey_05 | Generating an API Key | 00:00:01 |
| TC_PMS_GenerateApikey_06 | Generating an API Key | 00:00:01 |
| TC_PMS_GenerateApikey_04 | Generating an API Key | 00:00:01 |
| TC_PMS_GenerateApikey_02 | Generating an API Key | 00:00:01 |
| Pms_GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid | 00:00:01 | |
| ActivateDeactivatePartnerApiKey — Passed | ||
| TC_PMS_ActivateDeactivatePartnerApiKey_08 | Update the status for Activated PartnerAPIKey as Activate by Removing label | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_07 | Update the status for Activated PartnerAPIKey as Activate by Providing Duplicate label | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_06 | Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid Label | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_03 | Update the status for Activated PartnerAPIKey as Activate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_02 | Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid APIKey | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_01 | Update the status for Deactivated PartnerAPIKey as Deactivate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_04 | Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid PartnerId | 00:00:01 |
| TC_PMS_ActivateDeactivatePartnerApiKey_05 | Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid PolicyId | 00:00:01 |
| InsertDBData — Passed | ||
| TC_DBDependent_InsertQuery_03 | Inserting data in partner policy table for creation of API Key ID | 00:00:01 |
| TC_DBDependent_InsertQuery_02 | Inserting data in partner policy table for creation of API Key ID | 00:00:01 |
| TC_DBDependent_InsertQuery_01 | Inserting data in partner policy table for creation of API Key ID | 00:00:01 |
| GetAllApiKeyForAuthPartner — Passed | ||
| TC_PMS_GetAllApikeyForAuthPartner_01 | Fetching all the API Key available for Auth Partner | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_03 | Fetching all the API Key available for Auth Partner with invalid token | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_02 | Fetching all the API Key available for Auth Partner without token | 00:00:01 |
| GetAllApiKeyForAuthPartnerAfterDeactive — Passed | ||
| TC_PMS_GetAllApikeyForAuthPartner_01 | Fetching all the API Key available for Auth Partner | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_03 | Fetching all the API Key available for Auth Partner with invalid token | 00:00:01 |
| TC_PMS_GetAllApikeyForAuthPartner_02 | Fetching all the API Key available for Auth Partner without token | 00:00:01 |
| GetAllPartnerPolicyRequest — Passed | ||
| TC_PMS_partner-policy-requests_01 | Fetching all the partner policy requests | 00:00:01 |
| TC_PMS_partner-policy-requests_07 | Fetching all the partner policy requests for policyId which contains '2' | 00:00:01 |
| TC_PMS_partner-policy-requests_22 | Fetching all the partner policy requests by giving value for partnerId and requestDetails | 00:00:01 |
| TC_PMS_partner-policy-requests_05 | Fetching all the partner policy requests for orgName which contains '1' | 00:00:01 |
| TC_PMS_partner-policy-requests_19 | Fetching all the partner policy requests by giving valid page number given | 00:00:01 |
| TC_PMS_partner-policy-requests_04 | Fetching all the partner policy requests for PartnerId which contains 'a' | 00:00:01 |
| TC_PMS_partner-policy-requests_10 | Fetching all the partner policy requests for partnerType which contains 'a' | 00:00:01 |
| TC_PMS_partner-policy-requests_09 | Fetching all the partner policy requests for policyGroupName which contains 'Group' | 00:00:01 |
| TC_PMS_partner-policy-requests_08 | Fetching all the partner policy requests for policyName which contains 'policy' | 00:00:01 |
| TC_PMS_partner-policy-requests_21 | Fetching all the partner policy requests by giving random value for partnerid | 00:00:01 |
| TC_PMS_partner-policy-requests_06 | Fetching all the partner policy requests for requestDetails which contains 'ab' | 00:00:01 |
| TC_PMS_partner-policy-requests_12 | Fetching all the partner policy requests by sort type ASC for the given sort field | 00:00:01 |
| TC_PMS_partner-policy-requests_11 | Fetching all the partner policy requests by sort type DESC for the given sort field | 00:00:01 |
| TC_PMS_partner-policy-requests_14 | Fetching all the partner policy requests for which status as Inprogress | 00:00:01 |
| TC_PMS_partner-policy-requests_15 | Fetching all the partner policy requests for which status as approved | 00:00:01 |
| TC_PMS_partner-policy-requests_16 | Fetching all the partner policy requests for which status as rejected | 00:00:01 |
| GetAllPartnerPolicyRequestNegativeScenarios — Passed | ||
| TC_PMS_partner-policy-requests_03 | Fetching all the partner policy requests with invalid token | 00:00:01 |
| TC_PMS_partner-policy-requests_18 | Fetching all the partner policy requests by giving negative pageNo value | 00:00:01 |
| TC_PMS_partner-policy-requests_17 | Fetching all the partner policy requests by giving negative pagesize value | 00:00:01 |
| TC_PMS_partner-policy-requests_20 | Fetching all the partner policy requests with invalid sortfieldname | 00:00:01 |
| TC_PMS_partner-policy-requests_13 | Fetching all the partner policy requests by invalid sort type | 00:00:01 |
| TC_PMS_partner-policy-requests_02 | Fetching all the partner policy requests without authentication | 00:00:01 |
| GetListOfPartners — Passed | ||
| TC_PMS_GetListOfPartners_01 | Fetching all the active List Of Partnered in the system | 00:00:02 |
| TC_PMS_GetListOfPartners_02 | Fetching all the active List Of Partnered in the system | 00:00:04 |
| TC_PMS_GetListOfPartners_24 | Retrieving all partners filtered by organization name and sorted in ascending order | 00:00:01 |
| TC_PMS_GetListOfPartners_23 | Retrieving all the Active partners | 00:00:01 |
| TC_PMS_GetListOfPartners_05 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_30 | Retrieving all partners filtered by certificateUploadStatus | 00:00:01 |
| TC_PMS_GetListOfPartners_31 | Retrieving all partners filtered by certificateUploadStatus in ascending order | 00:00:01 |
| TC_PMS_GetListOfPartners_33 | Retrieving all partners filtered by certificateUploadStatus in ascending order and without sortFieldName | 00:00:01 |
| TC_PMS_GetListOfPartners_32 | Retrieving all partners filtered by certificateUploadStatus in descending order | 00:00:01 |
| TC_PMS_GetListOfPartners_28 | Retrieving all partners filtered by partnerid and sorted in ascending order | 00:00:01 |
| TC_PMS_GetListOfPartners_09 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_12 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_14 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_08 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_10 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_11 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_13 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_29 | Retrieving all partners filtered by sortFieldName with invalid data | 00:00:01 |
| TC_PMS_GetListOfPartners_34 | Retrieving all partners filtered with invalid sortType | 00:00:01 |
| TC_PMS_GetListOfPartners_06 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_07 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_25 | Retrieving all partners filtered by partnerType and sorted in ascending order | 00:00:01 |
| TC_PMS_GetListOfPartners_26 | Retrieving all partners filtered by partnerType and sorted in descending order | 00:00:01 |
| TC_PMS_GetListOfPartners_28 | Retrieving all partners filtered by partnerid and sorted in ascending order | 00:00:01 |
| TC_PMS_GetListOfPartners_27 | Retrieving all partners filtered by partnerid and sorted in descending order | 00:00:01 |
| TC_PMS_GetListOfPartners_15 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_18 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_17 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_22 | Fetching all the active List Of Partner with empty policyGroup Name | 00:00:01 |
| TC_PMS_GetListOfPartners_04 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_19 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_16 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_21 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_03 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| TC_PMS_GetListOfPartners_20 | Fetching all the active List Of Partner with invalid sort | 00:00:01 |
| GetDetailsOfPartner — Passed | ||
| Pms_GetDetailsOfPartner_All_Valid_Smoke | Fetching all the details of the Partner Id | 00:00:01 |
| TC_PMS_GetPartnerDetails_01 | Retrieve Device Partner Deatils | 00:00:01 |
| Pms_GetDetailsOfPartner_invalid_token_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| Pms_GetDetailsOfPartner_with_admin_role_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| Pms_GetDetailsOfPartner_with_invalid_partner_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| Pms_GetDetailsOfPartner_with_unauthor_token_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| Pms_GetDetailsOfPartner_with_unauthorized_token_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| Pms_GetDetailsOfPartner_without_admin_role_Neg | Fetching all the details of the Partner Id | 00:00:01 |
| GetListOfPolicies — Passed | ||
| TC_PMS_listofPolicies_01 | Fetching all the active List Of Policies in the system | 00:00:01 |
| TC_PMS_listofPolicies_02 | Fetching all the active List Of Policies invalid token | 00:00:01 |
| TC_PMS_listofPolicies_21 | Fetching all the active List Of Policies with policyName and policyid given | 00:00:01 |
| TC_PMS_listofPolicies_08 | Fetching all the active List Of Policies with pageNo as '-6' | 00:00:01 |
| TC_PMS_listofPolicies_09 | Fetching all the active List Of Policies with pageSize as '-6' | 00:00:01 |
| TC_PMS_listofPolicies_10 | Fetching all the active List Of Policies with pageNo as '6' | 00:00:01 |
| TC_PMS_listofPolicies_07 | Fetching all the active List Of Policies with pageSize as '6' | 00:00:01 |
| TC_PMS_listofPolicies_20 | Fetching all the active List Of Policies with policyDescription as '3fdfds' | 00:00:01 |
| TC_PMS_listofPolicies_17 | Fetching all the active List Of Policies with policyDescription as 'a' | 00:00:01 |
| TC_PMS_listofPolicies_16 | Fetching all the active List Of Policies with policyGroupName as 'ab' | 00:00:01 |
| TC_PMS_listofPolicies_14 | Fetching all the active List Of Policies with policyId as '1' | 00:00:01 |
| TC_PMS_listofPolicies_15 | Fetching all the active List Of Policies with policyName as 'a' | 00:00:01 |
| TC_PMS_listofPolicies_19 | Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype | 00:00:01 |
| TC_PMS_listofPolicies_18 | Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype | 00:00:01 |
| TC_PMS_listofPolicies_11 | Fetching all the active List Of Policies with sortType as 'asc' | 00:00:01 |
| TC_PMS_listofPolicies_12 | Fetching all the active List Of Policies with sortType as 'desc' | 00:00:01 |
| TC_PMS_listofPolicies_13 | Fetching all the active List Of Policies with sortType as 'abdcfegff' | 00:00:01 |
| TC_PMS_listofPolicies_04 | Fetching all the active List Of Policies with status as 'activated' | 00:00:01 |
| TC_PMS_listofPolicies_05 | Fetching all the active List Of Policies with status as 'deactivated' | 00:00:01 |
| TC_PMS_listofPolicies_06 | Fetching all the active List Of Policies with status as 'draft' | 00:00:01 |
| TC_PMS_listofPolicies_03 | Fetching all the active List Of Policies without authentication | 00:00:01 |
| GetListOfPoliciesRequest — Passed | ||
| Pms_GetListOfPolicies_All_Valid_Smoke | Fetching all the active List Of Policies Request in the system | 00:00:01 |
| GetAllOidcClientBeforeOIDCCreation — Passed | ||
| TC_PMS_GetAllOidcClient_01 | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| OAuthClient — Passed | ||
| Pms_CreateOIDCClient_ForNeg_all_Valid_sid | Creating OAUTH Client | 00:00:01 |
| Pms_CreateOIDCClient_all_Valid_Smoke_sid | Creating OAUTH Client | 00:00:05 |
| Pms_CreateOIDCClient_invalid_RedirectUri_neg | Creating OAUTH Client with invalid redirectUri | 00:00:01 |
| Pms_CreateOIDCClient_invalid_auth_neg | Creating OAUTH Client without token | 00:00:01 |
| Pms_CreateOIDCClient_invalid_granttypes_neg | Creating OAUTH Client with invalid granttypes | 00:00:01 |
| Pms_CreateOIDCClient_invalid_logoUri_neg | Creating OAUTH Client with invalid logoUri | 00:00:01 |
| Pms_CreateOIDCClient_invalid_policyID_neg | Creating OAUTH Client with invalid policyid | 00:00:01 |
| Pms_CreateOIDCClient_invalid_publickey_neg | Creating OAUTH Client with invalid publickkey | 00:00:01 |
| Pms_CreateOIDCClient_without_granttypes_neg | Creating OAUTH Client without granttypes | 00:00:01 |
| Pms_CreateOIDCClient_without_name_neg | Creating OAUTH Client without name field | 00:00:01 |
| Pms_CreateOIDCClient_without_publickey_neg | Creating OAUTH Client without publickkey | 00:00:01 |
| GetAllOauthClient — Passed | ||
| Pms_GetAllOauthClient_All_Valid_Smoke | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| UpdateOAuthClient — Passed | ||
| Pms_UpdateOIDCClient_all_Valid_Smoke_sid | 00:00:01 | |
| GetAllOidcClient — Passed | ||
| TC_PMS_GetAllOidcClient_01 | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| GetAllOidcClientWithoutAuthentication — Passed | ||
| TC_PMS_GetAllOidcClient_02 | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| TC_PMS_GetAllOidcClient_01 | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| DeactivateOIDCClient — Passed | ||
| TC_PMS_DeactivateOIDCClient_03 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_11 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_10 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_05 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_04 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_09 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_07 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_08 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_06 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_02 | Deactivating The Oidc Client | 00:00:01 |
| TC_PMS_DeactivateOIDCClient_01 | Deactivating The Oidc Client | 00:00:01 |
| GetAllOidcClientAfterDeactivateOfOIDC — Passed | ||
| TC_PMS_GetAllOidcClient_01 | Fetching all OIDC Clients of the loggedin Partner | 00:00:01 |
| GetConfiguration — Passed | ||
| Partner_GetConfiguration_allValid_smoke | 00:00:01 | |
| GetUserConsentBeforeConsentGiven — Passed | ||
| TC_pms_GetUserConsent_05 | Retrieve the PMS GetUserConsent before consent is saved | 00:00:01 |
| saveUserConsent — Passed | ||
| TC_PMS_saveUserConsent_01 | save User Consent | 00:00:01 |
| TC_PMS_saveUserConsent_02 | save User Consent when authentication is done with invalid roles | 00:00:01 |
| TC_PMS_saveUserConsent_04 | save User Consent for invalid user | 00:00:01 |
| TC_PMS_saveUserConsent_03 | save User Consent without authentication | 00:00:01 |
| GetUserConsent — Passed | ||
| TC_pms_GetUserConsent_04 | Retrieve PMS GetUserConsent Status with an Invalid Auth Token | 00:00:01 |
| TC_pms_GetUserConsent_03 | Retrieve the PMS GetUserConsent Status for invalid User and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetUserConsent_02 | Retrieve the PMS GetUserConsent Status Without an Access Token and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetUserConsent_01 | Retrieve the PMS GetUserConsent for All Valid Smoke | 00:00:01 |
| GetOriginalPartnerCertificates — Passed | ||
| TC_PMS_getPartner_certificate_03 | Get original ftm partner certificates | 00:00:01 |
| TC_PMS_getPartner_certificate_01 | Get original Auth partner certificates | 00:00:01 |
| TC_PMS_getPartner_certificate_04 | Get original Auth partner certificates when authenticated as device partner | 00:00:01 |
| TC_PMS_getPartner_certificate_06 | Get original Auth partner certificates random value for partnerid | 00:00:01 |
| TC_PMS_getPartner_certificate_07 | Get original Auth partner certificates without authentication | 00:00:01 |
| TC_PMS_getPartner_certificate_05 | Get original Auth partner certificates without partnerid | 00:00:01 |
| CreatePartner_MISP_Provider — Passed | ||
| TC_PMS_createPartnerSelfRegistration_01 | Create MISP Partner Self Registration | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_02 | Create MISP Partner Self Registration for Misp License | 00:00:01 |
| TC_PMS_createPartnerSelfRegistration_03 | Create MISP Partner Self Registration for Misp License | 00:00:01 |
| UploadCACertificate_MISP_Provider — Passed | ||
| TC_PMS_uploadCert_01 | Upload valid CA certificate for Misp Partner | 00:00:01 |
| TC_PMS_uploadCert_02 | Upload valid SUBCA certificate for Misp Partner | 00:00:01 |
| UploadPartnerCertificate_MISP_Provider — Passed | ||
| TC_PMS_UploadPartnerCert_01 | Upload valid certificate for Misp Partner | 00:00:01 |
| TC_PMS_UploadPartnerCert_02 | Upload valid certificate for Misp License | 00:00:01 |
| TC_PMS_UploadPartnerCert_03 | Upload valid certificate for Misp License with valid PartnerID | 00:00:01 |
| GetPartnerDetails_MISP_Provider — Passed | ||
| TC_PMS_getPartnerCert_01 | Retrieve Misp Partner details | 00:00:01 |
| TC_PMS_getPartnerCert_02 | Retrieve Misp Partner details with valid PartnerId | 00:00:01 |
| GetPartnerCertificate_MISP_Provider — Passed | ||
| TC_PMS_getPartnerCert_01 | Retrieve Misp Partner Certificate | 00:00:01 |
| CreateDeviceDetail — Passed | ||
| TC_PMS_createServiceToSaveDeviceDetail_01 | Create Service To Save Device Details with valid details | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_05 | Create Service To Save Device Details while keeping already exisits Model | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_06 | Create Service To Save Device Details while keeping DeviceId as empty | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_07 | Create Service To Save Device Details while keeping DeviceProviderId as empty | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_08 | Create Service To Save Device Details while keeping DeviceSubTypeCode as empty | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_09 | Create Service To Save Device Details while keeping DeviceTypeCode as empty | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_02 | Create Service To Save Device Details while keeping same Make Model Type with valid details | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_03 | Create Service To Save Device Details while keeping same Make Model with valid details | 00:00:01 |
| TC_PMS_createServiceToSaveDeviceDetail_04 | Create Service To Save Device Details while keeping same Type SubType with valid details | 00:00:01 |
| RejectDeviceDetail — Passed | ||
| TC_PMS_rejectDeviceDetail_01 | Reject Device Details with valid details | 00:00:01 |
| TC_PMS_rejectDeviceDetail_03 | Reject Device Details while keeping approvalStatus as empty | 00:00:01 |
| TC_PMS_rejectDeviceDetail_04 | Reject Device Details while keeping deviceId as empty | 00:00:01 |
| TC_PMS_rejectDeviceDetail_02 | Reject Device Details with valid details | 00:00:01 |
| ApproveDeviceDetail — Passed | ||
| TC_PMS_createApproveRejectDeviceDetail_01 | Create Device details for Approved Partner as Activate | 00:00:01 |
| TC_PMS_createApproveRejectDeviceDetail_02 | Create Device details for Approved Partner while keeping approvalStatus as empty | 00:00:01 |
| TC_PMS_createApproveRejectDeviceDetail_03 | Create Device details for Approved Partner as Activate while keeping deviceId as empty | 00:00:01 |
| UpdateDeviceDetail — Passed | ||
| TC_PMS_createServiceToUpdateDeviceDetail_01 | Create Service To Update DeviceDetail with valid details | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_03 | Create Service To Update DeviceDetail while keeping DeviceId as empty | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_04 | Create Service To Update DeviceDetail while keeping DeviceProvideId as empty | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_05 | Create Service To Update DeviceDetail while keeping DeviceSubTypeCode as empty | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_06 | Create Service To Update DeviceDetail while keeping DeviceTypeCode as empty | 00:00:01 |
| TC_PMS_createServiceToUpdateDeviceDetail_02 | Create Service To Update DeviceDetail afterReject | 00:00:01 |
| DeviceDetailsFilter — Passed | ||
| TC_PMS_DeviceDetailsFilter_06 | Create Device Details Filter while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_05 | Create Device Details Filter while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_04 | Create Device Details Filter while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_07 | Create Device Details Filter while keeping invalid values in Type parameter | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_02 | Create Device Details Filter to MapSBI | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_01 | Create Device Details Filter with valid values | 00:00:01 |
| TC_PMS_DeviceDetailsFilter_03 | Create Device Details Filter with valid values | 00:00:01 |
| createSearchDeviceType — Passed | ||
| TC_PMS_createSearchDeviceType_01 | Create Search Device Type with all valid details | 00:00:01 |
| TC_PMS_createSearchDeviceType_02 | Create Search Device Type with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceType_04 | Create Search Device Type with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceType_05 | Create Search Device Type | 00:00:01 |
| TC_PMS_createSearchDeviceType_03 | Create Search Device Type with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceType_10 | Create Search Device Type while keeping sortField parameter as invalid | 00:00:01 |
| TC_PMS_createSearchDeviceType_08 | Create Search Device Type while keeping sortType parameter as invalid | 00:00:01 |
| TC_PMS_createSearchDeviceType_06 | Create Search Device Type while keeping columnName parameter as empty | 00:00:01 |
| TC_PMS_createSearchDeviceType_11 | Create Search Device Type while keeping sortField parameter as empty | 00:00:01 |
| TC_PMS_createSearchDeviceType_09 | Create Search Device Type while keeping sortType parameter as empty | 00:00:01 |
| TC_PMS_createSearchDeviceType_07 | Create Search Device Type while keeping Type parameter as empty | 00:00:01 |
| createSearchDeviceDetails — Passed | ||
| TC_PMS_createSearchDeviceDetails_02 | Create Search Device Details with all valid data | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_03 | Create Search Device Details with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_05 | Create Search Device Details with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_04 | Create Search Device Details with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_01 | Create Search Device Details while Type parameter as Equals and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_06 | Create Search Device Details with invalid columnName | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_10 | Create Search Device Details while keeping sortField parameter as invalid | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_08 | Create Search Device Details while keeping sortType parameter as invalid | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_11 | Create Search Device Details while keeping sortField parameter as empty | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_09 | Create Search Device Details while keeping sortType parameter as empty | 00:00:01 |
| TC_PMS_createSearchDeviceDetails_07 | Create Search Device Details while keeping Type parameter as empty | 00:00:01 |
| GetListOfAllSBIBeforeAddingSBI — Passed | ||
| TC_PMS_SBI_List_21 | Fetching all the active SBI | 00:00:01 |
| SaveSecureBiometricInterfaceCreateDto — Passed | ||
| Pms_SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid | 00:00:01 | |
| Pms_SaveSecureBiometricInterface_All_Valid_Smoke_sid | 00:00:01 | |
| TC_PMS_createSaveSecureBiometricInterface_06 | Create SaveSecureBiometricInterface while keeping parameter PartnerId as empty | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_05 | Create SaveSecureBiometricInterface while keeping parameter swVersion as empty | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_07 | Create SaveSecureBiometricInterface while keeping parameter SpaceVal as empty | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_03 | Create SaveSecureBiometricInterface To Map sId | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_08 | Create SaveSecureBiometricInterface with valid details | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_08 | Create SaveSecureBiometricInterface with valid details | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_02 | Create SaveSecureBiometricInterface with valid details | 00:00:01 |
| TC_PMS_createSaveSecureBiometricInterface_04 | Create SaveSecureBiometricInterface with duplicate swVersion | 00:00:01 |
| RejectSecureBiometricInterface — Passed | ||
| TC_PMS_RejectSecureBiometricInterface_01 | Reject SecureBiometricInterface with valid detais | 00:00:01 |
| TC_PMS_RejectSecureBiometricInterface_04 | Reject SecureBiometricInterface while keeping parameter approvalStatus as Empty | 00:00:01 |
| TC_PMS_RejectSecureBiometricInterface_03 | Reject SecureBiometricInterface with SpaVal invalid | 00:00:01 |
| ApproveSecureBiometricInterface — Passed | ||
| TC_PMS_ApproveSecureBiometricInterface_01 | Approvr Secure Biometric Interface with valid details | 00:00:01 |
| TC_PMS_ApproveSecureBiometricInterface_02 | Approvr Secure Biometric Interface while keeping parameter approval status as empty | 00:00:01 |
| TC_PMS_ApproveSecureBiometricInterface_01 | Approvr Secure Biometric Interface with valid details | 00:00:01 |
| TC_PMS_ApproveSecureBiometricInterface_01 | Approvr Secure Biometric Interface with valid details | 00:00:01 |
| UpdateSecureBiometricInterface — Passed | ||
| TC_PMS_createUpdateSecureBiometricInterface_02 | Create UpdateSecureBiometricInterface AfterRejectwith valid details | 00:00:01 |
| Pms_UpdateSecureBiometricInterface_DeviceProvider_AllValid_Smoke | 00:00:01 | |
| TC_PMS_createUpdateSecureBiometricInterface_03 | Create UpdateSecureBiometricInterface while keeping parameter ID as empty | 00:00:01 |
| TC_PMS_createUpdateSecureBiometricInterface_02 | Create UpdateSecureBiometricInterface AfterRejectwith valid details | 00:00:01 |
| createSearchSecureBiometric — Passed | ||
| TC_PMS_createSearchSecureBiometric_01 | Create Search Secure Biometric with valid details | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_02 | Create Search Secure Biometric with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_04 | Create Search Secure Biometric with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_03 | Create Search Secure Biometric with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchSecureBiometric_05 | Create Search Secure Biometric while keeping Type parameter as contains and filter data in ascending order | 00:00:01 |
| GetAllApprovedDeviceProviderIds — Passed | ||
| TC_PMS_GetAllApprovedDeviceProviders_01 | Get All Approved Device ProviderId | 00:00:01 |
| GetAllApprovedDeviceProviderIdsNegativeScenarios — Passed | ||
| TC_PMS_GetAllApprovedDeviceProviderIds_02 | Retrieve All Approved Device ProviderIds with invalid access token | 00:00:01 |
| TC_PMS_GetAllApprovedDeviceProviderIds_01 | Retrieve All Approved Device ProviderIds Without Authentication | 00:00:01 |
| TC_PMS_GetAllApprovedDeviceProviderIds_04 | Retrieve All Device ProviderIds with Admin roles | 00:00:01 |
| TC_PMS_GetAllApprovedDeviceProviderIds_03 | Retrieve All Approved Device ProviderIds without_partner_roles | 00:00:01 |
| UpdateSBIID — Passed | ||
| TC_UpdateSBID_InsertQuery_03 | Updating SBI ID in SBI table for 10 days Expiry | 00:00:01 |
| TC_UpdateSBID_InsertQuery_02 | Updating SBI ID in SBI table for 15 days Expiry | 00:00:01 |
| TC_UpdateSBID_InsertQuery_01 | Updating SBI ID in SBI table for 30 days Expiry | 00:00:01 |
| GetSbiDetailsList — Passed | ||
| TC_pms_GetSbiDetailsList_01 | Retrieve the PMS GetSbiDetails List for All Valid Inputs | 00:00:01 |
| TC_pms_GetSbiDetailsList_03 | Retrieve Partner SBI Details with Admin Role and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetSbiDetailsList_05 | Retrieve Response With Authentication Partner Role and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetSbiDetailsList_06 | Retrieve Response With Authentication Partner Role and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetSbiDetailsList_04 | Retrieve Response Without Partner Role and Expecting an Error in The Response | 00:00:01 |
| TC_pms_GetSbiDetailsList_02 | Retrieve responce without authorization taken and Expecting an Error in The Response | 00:00:01 |
| DeviceTypeFilter — Passed | ||
| TC_PMS_DeviceTypeFilter_02 | Create Device Type Filter for Partner with valid values | 00:00:01 |
| TC_PMS_DeviceTypeFilter_05 | Create Device Type Filter for Partner while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_DeviceTypeFilter_04 | Create Device Type Filter for Partner while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_DeviceTypeFilter_03 | Create Device Type Filter for Partner while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_DeviceTypeFilter_06 | Create Device Type Filter for Partner while keeping invalid values in Type parameter | 00:00:01 |
| DeviceSubTypeFilter — Passed | ||
| TC_PMS_DeviceSubTypeFilter_01 | Device SubType Filter | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_02 | Create DeviceSubType Filter with valid values | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_06 | Create DeviceSubType Filter while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_04 | Create DeviceSubType Filter while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_03 | Create DeviceSubType Filter while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_DeviceSubTypeFilter_05 | Create DeviceSubType Filter while keeping invalid values in Type parameter | 00:00:01 |
| SaveDeviceDetails — Passed | ||
| TC_PMS_SaveDeviceDetails_04 | Save Device Details | 00:00:01 |
| TC_PMS_SaveDeviceDetails_03 | Save Device Details | 00:00:01 |
| TC_PMS_SaveDeviceDetails_02 | Save Device Details | 00:00:01 |
| TC_PMS_SaveDeviceDetails_01 | Save Device Details | 00:00:01 |
| GetListOfAllSBI — Passed | ||
| TC_PMS_SBI_List_03 | Fetching all the active SBI | 00:00:01 |
| TC_PMS_SBI_List_24 | Fetching all the SBI details filter by Expiry period 10 days | 00:00:01 |
| TC_PMS_SBI_List_23 | Fetching all the SBI details filter by Expiry period 15 days | 00:00:01 |
| TC_PMS_SBI_List_22 | Fetching all the SBI details filter by Expiry period 30 days | 00:00:01 |
| TC_PMS_SBI_List_21 | Fetching all the SBI details with Parter device token | 00:00:01 |
| TC_PMS_SBI_List_14 | Fetching all the active SBI with orgName contains '1' | 00:00:01 |
| TC_PMS_SBI_List_20 | Fetching all the active SBI with pageSize specified | 00:00:01 |
| TC_PMS_SBI_List_15 | Fetching all the active SBI with partnerId contains 'a' | 00:00:01 |
| TC_PMS_SBI_List_18 | Fetching all the active SBI with random value for partnerId | 00:00:01 |
| TC_PMS_SBI_List_12 | Fetching all the active SBI with sbiExpiryStatus as expired | 00:00:01 |
| TC_PMS_SBI_List_13 | Fetching all the active SBI with sbiExpiryStatus as vaild | 00:00:01 |
| TC_PMS_SBI_List_12 | Fetching all the active SBI with sbiVersion | 00:00:01 |
| TC_PMS_SBI_List_15 | Fetching all the active SBI with ASC | 00:00:01 |
| TC_PMS_SBI_List_17 | Fetching all the active SBI with sbiVersion | 00:00:01 |
| TC_PMS_SBI_List_09 | Fetching all the active SBI with status as approved | 00:00:01 |
| TC_PMS_SBI_List_10 | Fetching all the active SBI with status as deactivated | 00:00:01 |
| TC_PMS_SBI_List_11 | Fetching all the active SBI with status as pending_approval | 00:00:01 |
| TC_PMS_SBI_List_08 | Fetching all the active SBI with status as rejected | 00:00:01 |
| ServiceToFilterSBI — Passed | ||
| TC_PMS_ServiceToFilterSBI_02 | Create ServiceToFilterSBI for Partner while keeping Type parameter as All | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_06 | Create ServiceToFilterSBI for Partner while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_04 | Create ServiceToFilterSBI for Partner while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_03 | Create ServiceToFilterSBI for Partner while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_05 | Create ServiceToFilterSBI for Partner while keeping invalid values in Type parameter | 00:00:01 |
| TC_PMS_ServiceToFilterSBI_01 | Create ServiceToFilterSBI for Partner while keeping Type parameter as Unique | 00:00:01 |
| MapDeviceWithSBI — Passed | ||
| TC_PMS_MapDeviceWithSBI_01 | MapDeviceWithSBI with valid details | 00:00:01 |
| TC_PMS_MapDeviceWithSBI_02 | MapDevice Partner With Multiple SBI valid details | 00:00:01 |
| TC_PMS_MapDeviceWithSBI_04 | MapDevice Partner With Multiple SBI with different Provider | 00:00:01 |
| TC_PMS_MapDeviceWithSBI_03 | MapDevice Partner With Multiple SBI | 00:00:01 |
| RemoveMapDeviceWithSBI — Passed | ||
| TC_PMS_RemoveMapDeviceWithSBI_01 | Remove Partner Mapped Device with SBI | 00:00:01 |
| ApproveMappingDeviceToSbi — Passed | ||
| TC_PMS_ApproveMappingDevice_01 | Approve Mapping Device To Sbi | 00:00:01 |
| TC_PMS_ApproveMappingDevice_02 | Approve Mapping Device To Sbi | 00:00:01 |
| ApproveMappingDeviceToSbiNegativeScenarios — Passed | ||
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_01 | Approve mapping device to sbi with different deviceDetails | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_09 | Approve mapping device to sbi by providing parameters which are already approved | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_10 | Approve mapping device to sbi by providing invalid Device ID | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_13 | Approve mapping device to sbi with Invalid Partner Authentication | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_11 | Approve mapping device to sbi by providing invalid SBI ID | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_08 | Approve mapping device to sbi while keeping SBI ID parameter as missing | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_06 | Approve mapping device to sbi with randome Device provider Id | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_12 | Approve mapping device to sbi without Partner Authentication | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_03 | Approve mapping device to sbi without Request ID | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_07 | Approve mapping device to sbi without requestTime | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_02 | Approve mapping device to sbi without without sbiId value | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_04 | Approve mapping device to sbi without Version value | 00:00:01 |
| TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_05 | Approve mapping device to sbi without Device provider Id | 00:00:01 |
| RejectMappingDeviceToSbi — Passed | ||
| TC_PMS_RejectMappingDeviceToSbi_01 | Reject Mapping Device To Sbi | 00:00:01 |
| RejectMappingDeviceToSbiwhichisRejected — Passed | ||
| TC_PMS_RejectMappingDeviceToSbi_32 | Reject mapping device to sbi by providing SBI which is Rejected and expecting an error in response | 00:00:01 |
| RejectMappingDeviceToSbiNegativeScenarios — Passed | ||
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_03 | Reject mapping device to sbi while keeping ReqID parameter as Null in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_29 | Reject mapping device to sbi while keeping device ID as Empty in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_19 | Reject mapping device to sbi while keeping Empty Partner ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_14 | Reject mapping device to sbi while keeping RequestTime parameter as Empty string in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_13 | Reject mapping device to sbi while keeping RequestTime parameter as Empty in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_23 | Reject mapping device to sbi while keeping Empty SBI ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_08 | Reject mapping device to sbi while keeping Version parameter as Empty in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_20 | Reject mapping device to sbi while keeping Invalid SBI ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_10 | Reject mapping device to sbi while keeping Version parameter as invalid value 0 in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_09 | Reject mapping device to sbi while keeping Version parameter as invalid value 1 in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_11 | Reject mapping device to sbi while keeping Version parameter as invalid values in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_02 | Reject mapping device to sbi while passing Invalid RequestID parameter in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_06 | Reject mapping device to sbi while keeping Version parameter as Missing in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_07 | Reject mapping device to sbi while keeping Version parameter as Null in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_33 | Reject mapping device to sbi with different SBI ID and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_04 | Reject mapping device to sbi while keeping ReqID parameter as Empty in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_05 | Reject mapping device to sbi while keeping ReqID parameter as Invalid in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_25 | Reject mapping device to sbi while providing already rejeceted device ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_15 | Reject mapping device to sbi while keeping RequestTime value other than given format in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_26 | Reject mapping device to sbi while providing invalid device ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_30 | Reject mapping device to sbi while keeping device ID values in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_17 | Reject mapping device to sbi while keeping invalid Partner ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_16 | Reject mapping device to sbi with invalid object paramter in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_28 | Reject mapping device to sbi while keeping device ID as null in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_18 | Reject mapping device to sbi while keeping null Partner ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_22 | Reject mapping device to sbi while keeping null SBI ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_24 | Reject mapping device to sbi while keeping random SBI ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_31 | Reject mapping device to sbi with Parter roles and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_27 | Reject mapping device to sbi with different device ID in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_01 | Reject mapping device to sbi without Partner Authentication and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_12 | Reject mapping device to sbi without RequestTime parameter in request and expecting an error in response | 00:00:01 |
| TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_21 | Reject mapping device to sbi while keeping without SBI ID in request and expecting an error in response | 00:00:01 |
| ApproveMappingDeviceToSbiwhichisRejected — Passed | ||
| TC_PMS_ApproveMappingDevice_14 | Approve Mapping Device To Sbi when SBI is Rejected | 00:00:01 |
| GetAllDeviceListMappedWithSbi — Passed | ||
| TC_PMS_GetAllDeviceListMappedwithSbi_01 | Get All Device List Mapped With Sbi | 00:00:01 |
| GetAllDeviceListMappedWithSbiNegativeScenarios — Passed | ||
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_02 | Retrieve all Device list which are mapped with SBI by provinding invalid SBI id in request | 00:00:01 |
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_03 | Retrieve all Device list when SBI given is different from the authentiacted device provider | 00:00:01 |
| TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_01 | Retrieve all Device list which are mapped with SBI without Authentication | 00:00:01 |
| DeactivateSBIwhichisPendingforApproval — Passed | ||
| TC_PMS_DeactivateSBIWithAssociatedDevices_21 | Deactivate SBI which is pending for approval | 00:00:01 |
| GetPartnersPolicy — Passed | ||
| TC_PMS_GetPartnersPolicy_01 | Retrieve Partner Policy details | 00:00:01 |
| TC_PMS_GetPartnersPolicy_02 | Retrieve Partners Policy details while keeping invalid PartnerId | 00:00:01 |
| GetAllPolicyGroup — Passed | ||
| TC_PMS_GetAllPolicyGroup_01 | Retrieve All Partner Policy Group | 00:00:03 |
| CreateSearchPolicyGroup — Passed | ||
| TC_PMS_createSearchPolicyGroup_01 | Create Search Policy Group with all valid details | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_02 | Create Search Policy Group with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_04 | Create Search Policy Group with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_03 | Create Search Policy Group with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_12 | Create Search Policy Group while keeping columnName parameter as id and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_11 | Create Search Policy Group while keeping columnName parameter as id and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_05 | Create Search Policy Group while keeping Type parameter as contains and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_06 | Create Search Policy Group while keeping Type parameter as contains and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_08 | Create Search Policy Group while keeping Type parameter as equals and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_07 | Create Search Policy Group while keeping Type parameter as equals and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_09 | Create Search Policy Group while keeping Type parameter as startswith and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_10 | Create Search Policy Group while keeping Type parameter as startswith and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPolicyGroup_13 | Create Search Policy Group while keeping columnName parameter as empty | 00:00:01 |
| PolicyGroupFilter — Passed | ||
| TC_PMS_PolicyGroupFilter_06 | Create Policy Group Filter for Partner while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_PolicyGroupFilter_05 | Create Policy Group Filter for Partner while keeping ColumnName parameter as Empty | 00:00:01 |
| TC_PMS_PolicyGroupFilter_04 | Create Policy Group Filter for Partner while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_PolicyGroupFilter_07 | Create Policy Group Filter for Partner while keeping invalid values in Type parameter | 00:00:01 |
| TC_PMS_PolicyGroupFilter_02 | Create Policy Group Filter for Partner with valid values | 00:00:01 |
| TC_PMS_PolicyGroupFilter_01 | Create Policy Group Filter for Partner using valid name | 00:00:01 |
| TC_PMS_PolicyGroupFilter_03 | Create Policy Group Filter for Partner while keeping valid name for coulmnname parameter | 00:00:01 |
| GetValueForConfigKey — Passed | ||
| TC_PMS_GetValueForConfigKey_02 | Retrieve valid Value For Config Key keeping invalid Key | 00:00:01 |
| PartnerFilter — Passed | ||
| TC_PMS_PartnerFilter_04 | Create Partner Filter while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_PartnerFilter_03 | Create Partner Filter while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_PartnerFilter_06 | Create Partner Filter while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_PartnerFilter_05 | Create Partner Filter while keeping invalid values in Type parameter | 00:00:01 |
| TC_PMS_PartnerFilter_02 | Create Partner Filter while keeping Type parameter as All | 00:00:01 |
| TC_PMS_PartnerFilter_01 | Create Partner Filter while keeping Type parameter as Unique | 00:00:01 |
| SearchPartnerApiKey — Passed | ||
| TC_PMS_SearchPartnerApiKey_01 | Create Search Partner API Key with valid data | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_02 | Create Search Partner API Key with Only FilterCriteria | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_04 | Create Search Partner API Key with Only PaginationCriteria | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_03 | Create Search Partner API Key with Only SortCriteria | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_05 | Create Search Partner API Key while keeping Type parameter as contains and filter data in ascending order | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_09 | Create Search Partner API Key while keeping Type parameter as contains and invalid columnName | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_06 | Create Search Partner API Key while keeping Type parameter as contains and invalid pagination | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_07 | Create Search Partner API Key while keeping Type parameter as contains and invalid sortField | 00:00:01 |
| TC_PMS_SearchPartnerApiKey_08 | Create Search Partner API Key while keeping Type parameter as contains and invalid sortType | 00:00:01 |
| SearchPartnerApiRequestKey — Passed | ||
| TC_PMS_SearchPartnerApiRequestKey_01 | Create Search Partner API Request Key with valid data | 00:00:02 |
| TC_PMS_SearchPartnerApiRequestKey_02 | Create Search Partner API Request Key with Only FilterCriteria | 00:00:02 |
| TC_PMS_SearchPartnerApiRequestKey_04 | Create Search Partner API Request Key with Only PaginationCriteria | 00:00:02 |
| TC_PMS_SearchPartnerApiRequestKey_03 | Create Search Partner API Request Key with Only SortCriteria | 00:00:02 |
| TC_PMS_SearchPartnerApiRequestKey_05 | Create Search Partner API Request Key while keeping Type parameter as contains and filter data in ascending order | 00:00:02 |
| TC_PMS_SearchPartnerApiRequestKey_06 | Create Search Partner API Request Key while keeping Type parameter as contains and invalid pagination | 00:00:01 |
| PartnerApiKeyRequestFilter — Passed | ||
| TC_PMS_PartnerApiKeyRequestFilter_01 | Create ApiKeyRequestFilter for Partner with valid values | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_05 | Create ApiKeyRequestFilter for Partner while keeping invalid values in Column parameter | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_04 | Create ApiKeyRequestFilter for Partner while keeping FilterColumn parameter as Empty | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_03 | Create ApiKeyRequestFilter for Partner while keeping FilterType parameter as Empty | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_06 | Create ApiKeyRequestFilter for Partner while keeping invalid values in Type parameter | 00:00:01 |
| TC_PMS_PartnerApiKeyRequestFilter_02 | Create ApiKeyRequestFilter for Partner with valid values | 00:00:01 |
| CreateSearchPartnerType — Passed | ||
| TC_PMS_createSearchPartnerType_02 | Create Search Partner Type with all valid data | 00:00:01 |
| TC_PMS_createSearchPartnerType_03 | Create Search Partner Type with Only FilterCriteria | 00:00:01 |
| TC_PMS_createSearchPartnerType_05 | Create Search Partner Type with Only PaginationCriteria | 00:00:01 |
| TC_PMS_createSearchPartnerType_04 | Create Search Partner Type with Only SortCriteria | 00:00:01 |
| TC_PMS_createSearchPartnerType_01 | Create Search Partner Type with valid data | 00:00:01 |
| TC_PMS_createSearchPartnerType_06 | Create Search Partner Type while keeping Type parameter as contains and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPartnerType_08 | Create Search Partner Type while keeping Type parameter as contains and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPartnerType_07 | Create Search Partner Type while keeping Type parameter as equals and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPartnerType_09 | Create Search Partner Type while keeping Type parameter as startswith and filter data in ascending order | 00:00:01 |
| TC_PMS_createSearchPartnerType_10 | Create Search Partner Type while keeping Type parameter as startswith and filter data in descending order | 00:00:01 |
| TC_PMS_createSearchPartnerType_13 | Create Search Partner Type while keeping columnName parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartnerType_18 | Create Search Partner Type while keeping sortField parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartnerType_16 | Create Search Partner Type while keeping sortType parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartnerType_11 | Create Search Partner Type while keeping Value parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartnerType_12 | Create Search Partner Type while keeping value parameter as invalid | 00:00:01 |
| TC_PMS_createSearchPartnerType_14 | Create Search Partner Type while keeping columnName parameter as empty | 00:00:01 |
| TC_PMS_createSearchPartnerType_19 | Create Search Partner Type while keeping sortField parameter as empty | 00:00:01 |
| TC_PMS_createSearchPartnerType_17 | Create Search Partner Type while keeping sortType parameter as empty | 00:00:01 |
| TC_PMS_createSearchPartnerType_15 | Create Search Partner Type while keeping Type parameter as empty | 00:00:01 |
| GetAllApprovedFtmProvider — Passed | ||
| Pms_All_Approved_Ftm_Provider_AllValid_Smoke | Fetching all the certificate for the Partner Id | 00:00:01 |
| GetAllApprovedFtmProviderNegativeScenarios — Passed | ||
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_03 | Retrieve all approved FTM Providers before uploading CA certificates | 00:00:01 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_04 | Retrieve all approved FTM Providers before uploading Partner certificate | 00:00:01 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_02 | Retrieve all approved FTM Providers with Invalid access token | 00:00:01 |
| TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_01 | Retrieve all approved FTM Providers without Partner authentication | 00:00:01 |
| GetListAllFTMChipNegativeScenarios — Passed | ||
| TC_PMS_GetListAllFTMChipNegativeScenarios_02 | Retrieve all FTM chip details with Invalid access token | 00:00:01 |
| TC_PMS_GetListAllFTMChipNegativeScenarios_03 | Retrieve all FTM chip details when FTM Chips are not added for Partner | 00:00:01 |
| TC_PMS_GetListAllFTMChipNegativeScenarios_05 | Retrieve all FTM chip details wwith Device Partner token | 00:00:01 |
| CreateFtmChipDetails — Passed | ||
| TC_PMS_CreateFTPChipDetail_01 | Create FTP Chip Deatils for Partner | 00:00:01 |
| TC_PMS_CreateFTPChipDetail_03 | Create FTP Chip Deatils for Partner while keeping ftpId parameter as missing | 00:00:01 |
| TC_PMS_CreateFTPChipDetail_02 | Create FTP Chip Deatils for Partner while keeping ftpProviderId parameter as missing | 00:00:01 |
| TC_PMS_createFtmChipDetails_01 | Create Ftm Chip Details | 00:00:01 |
| UpdateFtpChipDetail — Passed | ||
| TC_PMS_UpdateFtpChipDetail_01 | Update FTP Chip detail for Partner with valid details | 00:00:01 |
| TC_PMS_UpdateFtpChipDetail_02 | Update FTP Chip detail for Partner while keeping ftpChipDetailId parameter as missing | 00:00:01 |
| GetOriginalFtmCertifacteNegativeScenariosBeforeUploadCert — Passed | ||
| TC_PMS_GetOriginalFtmCertifacte_01 | Retrieve Original FTM Certifacte with valid Partner ID | 00:00:01 |
| DeactivateFtmwhichisPendingforCertUpload — Passed | ||
| TC_PMS_DeactivateFtm_20 | Deactivate FTM which is Pending for Approval | 00:00:01 |
| GetOriginalFtmCertifacteforPendingforCertUpload — Passed | ||
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_07 | Retrieve Original FTM Certifacte for Pending for Certificate Upload | 00:00:01 |
| UploadCertificateOfFtpChip — Passed | ||
| TC_PMS_UploadCertificateOfFtpChip_01 | Upload FTP chip Certificate | 00:00:01 |
| TC_PMS_UploadCertificateOfFtpChip_02 | Upload Certificate for FTP chip provider Partner while keeping ftpChipId parameter as invalid | 00:00:01 |
| TC_PMS_UploadCertificateOfFtpChip_01 | Upload Certificate for FTP chip provider Partner while keeping ftpProviderId parameter as invalid | 00:00:01 |
| DeactivateFtmwhichisPendingforApproval — Passed | ||
| TC_PMS_DeactivateFtm_19 | Deactivate FTM which is Pending for Approval | 00:00:01 |
| ApproveFTMChipDetail — Passed | ||
| TC_PMS_ApproveFTMchipDetail_01 | Approve FTM Chip Detail | 00:00:01 |
| TC_PMS_ApproveFtpChipDetail_02 | Update FTM Chip provider Partner while keeping ftpChipDetailID as missing | 00:00:01 |
| RejectFtpChipDetail — Passed | ||
| TC_PMS_rejectFtpChipDetail_01 | Reject FTP Chip detail for Partner | 00:00:01 |
| TC_PMS_rejectFtpChipDetail_02 | Reject FTP Chip detail for Partner while keeping ftpChipDetailId paramter as missing | 00:00:01 |
| GetFTPChipDetail — Passed | ||
| TC_PMS_GetFTPChipDetail_01 | Retreive FTP ChipDetails Partner with valid detail | 00:00:01 |
| GetListAllFTMChip — Passed | ||
| TC_PMS_GetListAllFTMChip_01 | Retrieve all FTM chip details with valid details | 00:00:01 |
| GetOriginalFtmCertifacte — Passed | ||
| TC_PMS_GetOriginalFtmCertifacte_01 | Retrieve Original FTM Certifacte with valid Partner ID | 00:00:01 |
| GetOriginalFtmCertifacteNegativeScenarios — Passed | ||
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_05 | Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_06 | Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_04 | Retrieve Original FTM Certifacte while keeping FTM ID parameter as Missing and expecting an error in the response | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_02 | Retrieve Original FTM Certifacte with invalid partner access token and expecting an error in the response | 00:00:01 |
| TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_01 | Retrieve Original FTM Certifacte without partner Authentication and expecting an error in the response | 00:00:01 |
| GetListOfFtmChip — Passed | ||
| TC_PMS_FTM_chip_03 | Fetching all the ftpchipdetail | 00:00:01 |
| TC_PMS_FTM_chip_18 | Fetching all the ftpchipdetail for make value contains 'abcd' | 00:00:01 |
| TC_PMS_FTM_chip_19 | Fetching all the ftpchipdetail for model value contains 'xyz' | 00:00:01 |
| TC_PMS_FTM_chip_08 | Fetching all the ftpchipdetail for orgName which contains '1' | 00:00:01 |
| TC_PMS_FTM_chip_17 | Fetching all the ftpchipdetail for pageSize specified | 00:00:01 |
| TC_PMS_FTM_chip_09 | Fetching all the ftpchipdetail for partnerId which contains 'a' | 00:00:01 |
| TC_PMS_FTM_chip_20 | Fetching all the ftpchipdetail by giving random value for partnerId | 00:00:01 |
| TC_PMS_FTM_chip_06 | Fetching all the ftpchipdetail by sort type ASC for the given sort field | 00:00:01 |
| TC_PMS_FTM_chip_07 | Fetching all the ftpchipdetail by sort type DESC for the given sort field | 00:00:01 |
| TC_PMS_FTM_chip_11 | Fetching all the ftpchipdetail for status as approved | 00:00:01 |
| TC_PMS_FTM_chip_12 | Fetching all the ftpchipdetail for status as deactivated | 00:00:01 |
| TC_PMS_FTM_chip_14 | Fetching all the ftpchipdetail for status as pending_approval | 00:00:01 |
| TC_PMS_FTM_chip_13 | Fetching all the ftpchipdetail for status as pending_cert_upload | 00:00:01 |
| TC_PMS_FTM_chip_10 | Fetching all the ftpchipdetail for status as rejected | 00:00:01 |
| TC_PMS_FTM_chip_21 | Fetching all the ftpchipdetail by giving value for both make and model | 00:00:01 |
| GetListOfFtmChipNegativeScenarios — Passed | ||
| TC_PMS_FTM_chip_16 | Fetching all the ftpchipdetail with negative pageNo | 00:00:01 |
| TC_PMS_FTM_chip_15 | Fetching all the ftpchipdetail with negative pagesize | 00:00:01 |
| TC_PMS_FTM_chip_05 | Fetching all the ftpchipdetail with invalid sortType | 00:00:01 |
| TC_PMS_FTM_chip_04 | Fetching all the ftpchipdetail with invalid sortfieldname | 00:00:01 |
| TC_PMS_FTM_chip_02 | Fetching all the ftpchipdetail with invalid token | 00:00:01 |
| TC_PMS_FTM_chip_01 | Fetching all the ftpchipdetail without authentication | 00:00:01 |
| GetListOfAllSBINegativeScenarios — Passed | ||
| TC_PMS_SBI_List_11 | Fetching all the SBI with invalid orgName | 00:00:01 |
| TC_PMS_SBI_List_12 | Fetching all the SBI with invalid sbiID | 00:00:01 |
| TC_PMS_SBI_List_13 | Fetching all the SBI with invalid sbiVersion | 00:00:01 |
| TC_PMS_SBI_List_15 | Fetching all the SBI by selecting only sortFieldName without selecting sortType and sortFieldName | 00:00:01 |
| TC_PMS_SBI_List_16 | Fetching all the SBI by selecting only sortType without selecting sortFieldName | 00:00:01 |
| TC_PMS_SBI_List_10 | Fetching all the SBI Version with passing Special Character | 00:00:01 |
| TC_PMS_SBI_List_08 | Fetching all the active SBI with negative pageNo value | 00:00:01 |
| TC_PMS_SBI_List_09 | Fetching all the active SBI with invalid sortFieldName | 00:00:01 |
| TC_PMS_SBI_List_05 | Fetching all the active SBI with invalid sortType | 00:00:01 |
| TC_PMS_SBI_List_04 | Fetching all the active SBI with invalid sortfield | 00:00:01 |
| TC_PMS_SBI_List_02 | Fetching all the active SBI with invalid token | 00:00:01 |
| TC_PMS_SBI_List_07 | Fetching all the active SBI with negative pageNo value | 00:00:01 |
| TC_PMS_SBI_List_06 | Fetching all the active SBI with negative pagesize value | 00:00:01 |
| TC_PMS_SBI_List_01 | Fetching all the active SBI without Authentication | 00:00:01 |
| GetListOfAllDevice — Passed | ||
| TC_PMS_devicedetails_01 | Fetching list of all the devices | 00:00:01 |
| TC_PMS_devicedetails_22 | Fetching list of all the devices with deviceId given as '9' | 00:00:01 |
| TC_PMS_devicedetails_24 | Fetching list of all the devices with random value given for deviceid | 00:00:01 |
| TC_PMS_devicedetails_18 | Fetching list of all the devices with deviceSubType given as 'i' | 00:00:01 |
| TC_PMS_devicedetails_17 | Fetching list of all the devices with deviceType given as 'i' | 00:00:01 |
| TC_PMS_devicedetails_16 | Fetching list of all the devices with invalid sortFieldName | 00:00:01 |
| TC_PMS_devicedetails_12 | Fetching list of all the devices with invalid sorttype | 00:00:01 |
| TC_PMS_devicedetails_03 | Fetching list of all the devices with invalid token | 00:00:01 |
| TC_PMS_devicedetails_19 | Fetching list of all the devices with make given as '3' | 00:00:01 |
| TC_PMS_devicedetails_20 | Fetching list of all the devices with model given as '4' | 00:00:01 |
| TC_PMS_devicedetails_23 | Fetching list of all the devices with make and model is given | 00:00:01 |
| TC_PMS_devicedetails_05 | Fetching list of all the devices with negative pageno | 00:00:01 |
| TC_PMS_devicedetails_06 | Fetching list of all the devices with negative pageSize | 00:00:01 |
| TC_PMS_devicedetails_21 | Fetching list of all the devices with sbiId given as 'q' | 00:00:01 |
| TC_PMS_devicedetails_15 | Fetching list of all the devices with sbiVersion given as 'abcd' | 00:00:01 |
| TC_PMS_devicedetails_13 | Fetching list of all the devices with sorttype as 'asc' | 00:00:01 |
| TC_PMS_devicedetails_14 | Fetching list of all the devices with sorttype as 'desc' | 00:00:01 |
| TC_PMS_devicedetails_25 | Fetching list of all the devices with orgName value given as '1' | 00:00:01 |
| TC_PMS_devicedetails_04 | Fetching list of all the devices with pagesize specified | 00:00:01 |
| TC_PMS_devicedetails_11 | Fetching list of all the devices with partnerid value given as 'a' | 00:00:01 |
| TC_PMS_devicedetails_08 | Fetching list of all the devices with status as approved | 00:00:01 |
| TC_PMS_devicedetails_09 | Fetching list of all the devices with status as deactivated | 00:00:01 |
| TC_PMS_devicedetails_10 | Fetching list of all the devices with status as pending_approval | 00:00:01 |
| TC_PMS_devicedetails_07 | Fetching list of all the devices with status as rejected | 00:00:01 |
| TC_PMS_devicedetails_02 | Fetching list of all the devices without authentication | 00:00:01 |
| GetCountOfFtm — Passed | ||
| Pms_GetCountOfFtm_All_Valid_Smoke | Fetching all active FTM | 00:00:01 |
| GetAllSystemConfigs — Passed | ||
| TC_PMS_GetAllSystemConfigs_01 | Fetching all the configuration for PMS | 00:00:01 |
| TC_PMS_GetAllSystemConfigs_02 | Fetching all the configuration for PMS without authentication | 00:00:01 |
| GetAllRootCertificate — Passed | ||
| Pms_GetAllRootCertificate_allValid_smoke | Fetching all the root certificates of the Logged in Partner | 00:00:01 |
| GetListOfApiKey — Passed | ||
| TC_PMS_GetListOfApiKey_01 | Fetching all the API Keys | 00:00:01 |
| TC_PMS_GetListOfApiKey_03 | Fetching the API Keys with individual partner | 00:00:01 |
| TC_PMS_GetListOfApiKey_04 | Fetching the API Keys with pageSize | 00:00:01 |
| TC_PMS_GetListOfApiKey_11 | Fetching the API Keys with invalid sortType | 00:00:01 |
| TC_PMS_GetListOfApiKey_05 | Fetching the API Keys with negative pageNo | 00:00:01 |
| TC_PMS_GetListOfApiKey_06 | Fetching the API Keys with negative pageSize | 00:00:01 |
| TC_PMS_GetListOfApiKey_16 | Fetching the API Keys with partial apiKeyLabel values | 00:00:01 |
| TC_PMS_GetListOfApiKey_14 | Fetching the API Keys with partial orgName value | 00:00:01 |
| TC_PMS_GetListOfApiKey_09 | Fetching the API Keys on passing partial partnerId value | 00:00:01 |
| TC_PMS_GetListOfApiKey_10 | Fetching the API Keys on passing partial policyGroupName value | 00:00:01 |
| TC_PMS_GetListOfApiKey_15 | Fetching the API Keys with partial policyName values | 00:00:01 |
| TC_PMS_GetListOfApiKey_17 | Fetching the API Keys with random values given to a valid parameter | 00:00:01 |
| TC_PMS_GetListOfApiKey_07 | Fetching the API Keys with status activated | 00:00:01 |
| TC_PMS_GetListOfApiKey_08 | Fetching the API Keys with status deactivated | 00:00:01 |
| TC_PMS_GetListOfApiKey_12 | Fetching the API Keys with ascending sortType | 00:00:01 |
| TC_PMS_GetListOfApiKey_13 | Fetching the API Keys with ascending sortType | 00:00:01 |
| TC_PMS_GetListOfApiKey_02 | Fetching the API Keys without authentication | 00:00:01 |
| DownloadRootCertificate — Passed | ||
| Pms_DownloadRootCertificate_allValid_smoke | Fetching all the root certificates of the Logged in Partner | 00:00:01 |
| CreateMispLicense — Passed | ||
| TC_PMS_CreateMispLicense_03 | Create MISP License Partner while keeping invalid ProviderID | 00:00:01 |
| TC_PMS_CreateMispLicense_02 | Create MISP License Partner with all valid details | 00:00:01 |
| TC_PMS_CreateMispLicense_01 | Create MISP License Partner | 00:00:01 |
| GetMispLicense — Passed | ||
| TC_PMS_GetMispLicense_01 | Retreive MispLicense for Partner | 00:00:01 |
| UpdateMispLicense — Passed | ||
| TC_PMS_UpdateMispLicense_02 | Update MispLicense Partner as active | 00:00:01 |
| TC_PMS_UpdateMispLicense_01 | Update MispLicense Partner as Deactive | 00:00:01 |
| TC_PMS_UpdateMispLicense_03 | Update MispLicense for Partner with InValid_licenseKeyStatus | 00:00:01 |
| GetMISPLicenseByMispID — Passed | ||
| TC_PMS_GetMISPLicenseByMispID_02 | Retreive MISPLicense for Activate MispID | 00:00:01 |
| TC_PMS_GetMISPLicenseByMispID_01 | Retreive MISPLicense for Deactivate MispID | 00:00:01 |
| TC_PMS_GetMISPLicenseByMispID_03 | Retreive MISPLicense for invalid MispID | 00:00:01 |
| SearchMispLicense — Passed | ||
| TC_PMS_SearchMispLicense_07 | Create Search Misp License with Empty Sort Field | 00:00:01 |
| TC_PMS_SearchMispLicense_03 | Create Search Misp License with invalid Page fetch | 00:00:01 |
| TC_PMS_SearchMispLicense_04 | Create Search Misp License with invalid Page Start | 00:00:01 |
| TC_PMS_SearchMispLicense_06 | Create Search Misp License with invalid SortField | 00:00:01 |
| TC_PMS_SearchMispLicense_05 | Create Search Misp License with invalid SortType | 00:00:01 |
| TC_PMS_SearchMispLicense_02 | Create Search Misp License with valid Filter Name | 00:00:01 |
| TC_PMS_SearchMispLicense_01 | Create Search Misp License with valid details | 00:00:01 |
| FilterMispLicense — Passed | ||
| TC_PMS_FilterMispLicense_01 | Create MispLicense Filter for Partner while keeping Type All | 00:00:01 |
| TC_PMS_FilterMispLicense_04 | Create MispLicense Filter for Partner while keeping Type parameter as Empty | 00:00:01 |
| TC_PMS_FilterMispLicense_06 | Create MispLicense Filter for Partner while keeping ColumnName parameter as Empty | 00:00:01 |
| TC_PMS_FilterMispLicense_03 | Create MispLicense Filter for Partner while keeping Text parameter as Empty | 00:00:01 |
| TC_PMS_FilterMispLicense_05 | Create MispLicense Filter for Partner while keeping ColumnName parameter as Invalid | 00:00:01 |
| TC_PMS_FilterMispLicense_02 | Create MispLicense Filter for Partner while keeping Type Unique | 00:00:01 |
| GetPartnerApiKeyRequest — Passed | ||
| TC_PMS_GetPartnerApiKeyRequest_01 | Retrieve ApiKeyRequests for Partner while keeping invalid PartnerId | 00:00:01 |
| GetBioExtractors — Passed | ||
| TC_PMS_GetBioExtractors_02 | Retrieve Bio Extractors for Partner while keeping invalid PartnerId | 00:00:01 |
| TC_PMS_GetBioExtractors_01 | Retrieve Bio Extractors for Partner | 00:00:01 |
| CreateBioExtractors — Passed | ||
| TC_PMS_CreateBioExtractors_02 | Create BioExtractors for Partner with invalid PolicyID | 00:00:01 |
| TC_PMS_CreateBioExtractors_01 | Create BioExtractors for Partner with invalid PartnerID | 00:00:01 |
| MapPartnerAndPolicytoCredentialType — Passed | ||
| TC_PMS_MapPartnerAndPolicytoCredentialType_01 | Create Mapping between Partner and Policy to CredentialType Partner | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_04 | Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid CredentialType | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_02 | Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid PartnerId | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_03 | Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid PolicyId | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_05 | Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid inactive Policy | 00:00:01 |
| TC_PMS_MapPartnerAndPolicytoCredentialType_06 | Create Mapping between Partner and Policy to CredentialType Partner while keeping duplicate PartnerId | 00:00:01 |
| GetPolicyforMappedPartnerAndCredentialtype — Passed | ||
| TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_01 | Retrieve Partner Policy for MappedPartner and CredentialType Partner | 00:00:01 |
| TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_03 | Retrieve Partner Policy for MappedPartner and CredentialType Partner while keeping invalid CredentialType | 00:00:01 |
| TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_02 | Retrieve Partner Policy for MappedPartner and CredentialType Partner while keeping invalid PartnerId | 00:00:01 |
| GetRoles — Passed | ||
| TC_PMS_GetRoles_01 | Retrieve all Partner Roles | 00:00:01 |
| ActivateDeactivatePartner — Passed | ||
| TC_PMS_ActivateDeactivatePartner_05 | Update the status for Activated Partner as Activate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_02 | Update the status for Deactivated MISP Partner as Deactivate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_03 | Update the status for Deactivated Tech-1233 Partner as Deactivate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_04 | Update the status for Deactivated Tech-321 Partner as Deactivate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_01 | Update the status for Deactivated Partner as Deactivate | 00:00:01 |
| TC_PMS_ActivateDeactivatePartner_06 | Update the status for Deactivated Partner as Deactivate for Invalid PartnerID | 00:00:01 |
| GetApiKeyRequests — Passed | ||
| TC_PMS_GetApiKeyRequests_01 | Retrieve ApiKeyRequests for Partner | 00:00:01 |
| AuditLogGenerateApiKey — Passed | ||
| TC_PMS_addContact_01 | Get the AuditLogs for add contact scenario | 00:00:25 |
| GetPolicyForApiKey — Passed | ||
| TC_PMS_GetPolicyForApiKey_03 | Retrieve Partner Policy API Key while keeping invalid APIKey | 00:00:01 |
| TC_PMS_GetPolicyForApiKey_02 | Retrieve Partner Policy API Key while keeping invalid PartnerId | 00:00:01 |
| TC_PMS_GetPolicyForApiKey_01 | Retrieve Partner Policy API Key | 00:00:01 |
| UpdatePolicyAgainstApiKey — Passed | ||
| TC_PMS_UpdatePolicyAgainstApiKey_01 | Update Policy Against ApiKey with valid details | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_04 | Update Policy Against ApiKey with invalid OldPolicyId | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_03 | Update Policy Against ApiKey with invalid ApiKey | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_05 | Update Policy Against ApiKey with invalid NewPolicyId | 00:00:01 |
| TC_PMS_UpdatePolicyAgainstApiKey_02 | Update Policy Against ApiKey with invalid PartnerId | 00:00:01 |
| AuditLogPartnerApiKey_ — Passed | ||
| TC_PMS_addContact_01 | Get the AuditLogs for add contact scenario | 00:00:02 |
| UpdatePolicyGroupForPartner — Passed | ||
| TC_PMS_UpdatePolicyGroupForPartner_01 | Update Policy Group For Partner with valid data | 00:00:01 |
| TC_PMS_UpdatePolicyGroupForPartner_02 | Update Policy Group For Partner with invalid Approved Partner | 00:00:01 |
| TC_PMS_UpdatePolicyGroupForPartner_04 | Update Policy Group For Partner with invalid Policy GroupId | 00:00:01 |
| TC_PMS_UpdatePolicyGroupForPartner_03 | Update Policy Group For Partner with invalid PartnerId | 00:00:01 |
| AuditLogUpdatePolicyGroupForPartner — Passed | ||
| TC_PMS_addContact_01 | Get the AuditLogs for add contact scenario | 00:00:02 |
| DBValidator — Passed | ||
| TC_PMS_DBValidator_03 | Create Data in database using APIKEY with valid details | 00:00:01 |
| TC_PMS_DBValidator_04 | Create Data in database using MISPLicense with valid details | 00:00:01 |
| TC_PMS_DBValidator_01 | Create Data in database using PMS with valid details | 00:00:01 |
| TC_PMS_DBValidator_02 | Create Data in database using Policy with valid details | 00:00:01 |
| DeactivateDevice — Passed | ||
| TC_PMS_DeactivateDevice_01 | Deactivate Device | 00:00:01 |
| DeactivateDeviceNegativeScenarios — Passed | ||
| TC_PMS_DeactivateDevice_07 | Deactivate Device which has been already Deactivated | 00:00:01 |
| TC_PMS_DeactivateDevice_05 | Deactivate Device while keeping requestTime paramter as Empty | 00:00:01 |
| TC_PMS_DeactivateDevice_04 | Deactivate Device while keeping requestTime paramter as Missing | 00:00:01 |
| TC_PMS_DeactivateDevice_09 | Deactivate Device while keeping Version parameter as Empty | 00:00:01 |
| TC_PMS_DeactivateDevice_02 | Deactivate Device by passing invalid Device ID | 00:00:01 |
| TC_PMS_DeactivateDevice_06 | Deactivate Device by passwing invalid Random Device ID | 00:00:01 |
| TC_PMS_DeactivateDevice_08 | Deactivate Device by passing invalid Version | 00:00:01 |
| TC_PMS_DeactivateDevice_03 | Deactivate Device by passing invalid requestTime | 00:00:01 |
| TC_PMS_DeactivateDevice_01 | Deactivate Device without Partner authentication | 00:00:01 |
| DeactivateSBIWithAssociatedDevices — Passed | ||
| TC_PMS_DeactivateSBIWithAssociatedDevices_01 | Deactivate SBI along with Associated Devices | 00:00:01 |
| DeactivateSBIWithAssociatedDevicesNegativeScenarios — Passed | ||
| TC_PMS_DeactivateSBIWithAssociatedDevices_15 | Deactivate SBI which already Deactivated in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_07 | Deactivate SBI while keeping ID parameter as Empty in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_10 | Deactivate SBI while keeping Version parameter as Empty in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_03 | Deactivate SBI while keeping requestTime parameter as Empty in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_18 | Deactivate SBI while keeping SBI ID parameter as Invalid Numeric values in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_04 | Deactivate SBI by passing Invalid ID parameter in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_19 | Deactivate SBI while keeping SBI ID parameter as Invalid values in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_12 | Deactivate SBI while keeping Version parameter as invalid value 0 in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_11 | Deactivate SBI while keeping Version parameter as invalid value 1 in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_13 | Deactivate SBI while keeping Version parameter as invalid values in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_14 | Deactivate SBI while keeping Request Time parameter as invalid in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_06 | Deactivate SBI while keeping ID parameter as Null in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_05 | Deactivate SBI while keeping ID parameter as Missing in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_08 | Deactivate SBI without Version parameter in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_02 | Deactivate SBI while keeping requestTime parameter as Missing in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_16 | Deactivate SBI while keeping SBI ID parameter as Null in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_09 | Deactivate SBI while keeping Version parameter as Null in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_17 | Deactivate SBI while keeping SBI ID parameter as Empty in request | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_01 | Deactivate SBI with associated Devices without Partner authentication | 00:00:01 |
| TC_PMS_DeactivateSBIWithAssociatedDevices_20 | Deactivate SBI with invalid Partner roles | 00:00:01 |
| ApproveMappingDeviceToSbiwhenSBIisDeactivated — Passed | ||
| TC_PMS_ApproveMappingDevice_15 | Approve Mapping Device To Sbi when SBI is Deactivated | 00:00:01 |
| DeactivateFtm — Passed | ||
| TC_PMS_DeactivateFtm_01 | Deactivate Device with valid Partner authentication | 00:00:01 |
| DeactivateFtmNegativeScenarios — Passed | ||
| TC_PMS_DeactivateFtmNegativeScenarios_14 | Deactivating the FTM which is already Deactivated and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_16 | Deactivate the FTM while keeping FTM ID parameter as Empty and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_04 | Deactivate FTM keeping ID parameter as Empty in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_07 | Deactivate FTM while keeping Version parameter as Empty in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_12 | Deactivate FTM while keeping requestTime parameter as Empty in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_17 | Deactivate the FTM while keeping FTM ID parameter as Invalid values and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_09 | Deactivate FTM while keeping Version parameter as invalid value 0 in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_08 | Deactivate FTM while keeping Version parameter as invalid value 1 in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_10 | Deactivate FTM while keeping Version parameter as invalid values in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_13 | Deactivate FTM while keeping Request Time parameter as invalid in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_03 | Deactivate FTM while keeping requestID parameter as Null in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_02 | Deactivate FTM with the requestID parameter missing in the request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_05 | Deactivate FTM while keeping Version parameter as Missing in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_11 | Deactivate FTM while keeping requestTime parameter as Missing in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_18 | Deactivate the FTM while keeping FTM ID parameter as Null and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_06 | Deactivate FTM while keeping Version parameter as Null in request and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_15 | Deactivate the FTM while keeping FTM ID parameter as Missing and expecting an error in the response | 00:00:01 |
| TC_PMS_DeactivateFtmNegativeScenarios_01 | Deactivate FTM without Partner authentication and expecting an error in the response | 00:00:01 |
| GetOriginalFtmCertifacteAfterDeactiveFtm — Passed | ||
| TC_PMS_GetOriginalFtmCertifacteAfterDeactiveFtm_01 | Get Original Ftm Certifacte After Deactivate Ftm | 00:00:01 |
| DeactivatePolicy — Passed | ||
| TC_PMS_deactivate_policy_01 | Deactivate policy | 00:00:01 |
| TC_PMS_deactivate_policy_11 | Deactivate policy with rejected policy | 00:00:01 |
| TC_PMS_deactivate_policy_06 | Deactivate policy which is already deactiavted | 00:00:01 |
| TC_PMS_deactivate_policy_04 | Deactivate policy with invalid policyid | 00:00:01 |
| TC_PMS_deactivate_policy_05 | Deactivate policy with only spaces as policyid | 00:00:01 |
| TC_PMS_deactivate_policy_03 | Deactivate policy authenticated with invalid roles | 00:00:01 |
| TC_PMS_deactivate_policy_12 | Deactivate policy with draft policy requests | 00:00:01 |
| TC_PMS_deactivate_policy_13 | Deactivate policy with draft policy requests | 00:00:01 |
| TC_PMS_deactivate_policy_10 | Deactivate policy with approved policy requests | 00:00:01 |
| TC_PMS_deactivate_policy_02 | Deactivate policy without authentication | 00:00:01 |
| TC_PMS_deactivate_policy_07 | Deactivate policy without id | 00:00:01 |
| TC_PMS_deactivate_policy_09 | Deactivate policy without requesttime | 00:00:01 |
| TC_PMS_deactivate_policy_08 | Deactivate policy without version | 00:00:01 |
| DeactivatePolicyGroup — Passed | ||
| TC_PMS_deactivate_policy_group_01 | Deactivate Policy Group | 00:00:01 |
| TC_PMS_deactivate_policy_group_12 | Deactivate Policy Group with future date given as requesttime | 00:00:01 |
| TC_PMS_deactivate_policy_group_05 | Deactivate Policy Group with invalid id value | 00:00:01 |
| TC_PMS_deactivate_policy_group_11 | Deactivate Policy Group invalid policygroupid | 00:00:01 |
| TC_PMS_deactivate_policy_group_03 | Deactivate Policy Group authenticated using invalid roles | 00:00:01 |
| TC_PMS_deactivate_policy_group_09 | Deactivate Policy Group with invalid status | 00:00:01 |
| TC_PMS_deactivate_policy_group_07 | Deactivate Policy Group invalid version | 00:00:01 |
| TC_PMS_deactivate_policy_group_13 | Deactivate Policy Group with past date given as requesttime | 00:00:01 |
| TC_PMS_deactivate_policy_group_10 | Deactivate Policy Group without policygroupid | 00:00:01 |
| TC_PMS_deactivate_policy_group_17 | Deactivate Policy Group with draft policy | 00:00:01 |
| TC_PMS_deactivate_policy_group_15 | Deactivate Policy Group with deactivated policies | 00:00:01 |
| TC_PMS_deactivate_policy_group_16 | Deactivate Policy Group with published policy | 00:00:01 |
| TC_PMS_deactivate_policy_group_02 | Deactivate Policy Group without authentication | 00:00:01 |
| TC_PMS_deactivate_policy_group_04 | Deactivate Policy Group without id value | 00:00:01 |
| TC_PMS_deactivate_policy_group_14 | Deactivate Policy Group without requesttime | 00:00:01 |
| TC_PMS_deactivate_policy_group_08 | Deactivate Policy Group without status | 00:00:01 |
| TC_PMS_deactivate_policy_group_06 | Deactivate Policy Group without version | 00:00:01 |
| GetAllNotifications — Passed | ||
| TC_PMS_GetAllNotifications_13 | Get All Notifications by using Partner Token and filtered by Notification Type Root | 00:00:01 |
| TC_PMS_GetAllNotifications_14 | Get All Notifications by filtering CertificateID without selecting NotificatioType filter | 00:00:01 |
| TC_PMS_GetAllNotifications_01 | Get All Notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_06 | Get All Notifications by filtering different format Created From Date | 00:00:01 |
| TC_PMS_GetAllNotifications_08 | Get All Notifications by filtering different format Created To Date | 00:00:01 |
| TC_PMS_GetAllNotifications_10 | Get All Notifications by filtering different format Expiry Date | 00:00:01 |
| TC_PMS_GetAllNotifications_38 | Fetch all Notifications by selecting Api key name label and selecting NotificationType as ftmChip | 00:00:01 |
| TC_PMS_GetAllNotifications_41 | Fetch all Notifications by selecting sbi Id and selecting NotificationType as ftmChip | 00:00:01 |
| TC_PMS_GetAllNotifications_35 | Fetch all notifications invalid PageNo | 00:00:01 |
| TC_PMS_GetAllNotifications_02 | Get All Notifications by filtering page size 4 | 00:00:01 |
| TC_PMS_GetAllNotifications_03 | Get All Notifications by filtering page size 4 | 00:00:01 |
| TC_PMS_GetAllNotifications_18 | Get All Notifications by filtering only Root certificate notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_32 | Fetch all ftmChip without selecting notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_19 | Get All Notifications by filtering only Active certificate notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_20 | Get All Notifications by filtering only Dismissed certificate notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_17 | Get All Notifications by filtering only Weekly summary notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_39 | Fetch all Notifications by selecting ftmChip Id and selecting NotificationType as sbi | 00:00:01 |
| TC_PMS_GetAllNotifications_30 | Fetch all ftmChip without selecting notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_36 | Fetch all Notifications with invalid pageNo | 00:00:01 |
| TC_PMS_GetAllNotifications_37 | Fetch all Notifications with invalid pageNo | 00:00:01 |
| TC_PMS_GetAllNotifications_31 | Fetch all SBI Chip with invalid data | 00:00:01 |
| TC_PMS_GetAllNotifications_34 | Fetch all SBI Chip with invalid SBI Version data | 00:00:01 |
| TC_PMS_GetAllNotifications_33 | Fetch all SBI Chip with invalid SBI Version data | 00:00:01 |
| TC_PMS_GetAllNotifications_28 | Fetch all FTM Chip with invalid data | 00:00:01 |
| TC_PMS_GetAllNotifications_29 | Fetch all ftmChip with make & model data | 00:00:01 |
| TC_PMS_GetAllNotifications_27 | Fetch all policyName with invalid data | 00:00:01 |
| TC_PMS_GetAllNotifications_26 | Fetch all policyName by selecting invalid notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_25 | Fetch all policyName without selecting notificationType | 00:00:01 |
| TC_PMS_GetAllNotifications_40 | Fetch all Notifications by selecting sbi Id and selecting NotificationType as ftmChip | 00:00:01 |
| TC_PMS_GetAllNotifications_23 | Get All Notifications by filtering only IntermediateType certificate notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_21 | Get All Notifications by filtering only RootType certificate notifications | 00:00:01 |
| TC_PMS_GetAllNotifications_04 | Get All Notifications by filtering invalid certificate ID | 00:00:01 |
| TC_PMS_GetAllNotifications_05 | Get All Notifications by filtering invalid Created From Date | 00:00:01 |
| TC_PMS_GetAllNotifications_07 | Get All Notifications by filtering invalid Created To Date | 00:00:01 |
| TC_PMS_GetAllNotifications_09 | Get All Notifications by filtering invalid Expiry Date | 00:00:01 |
| TC_PMS_GetAllNotifications_11 | Get All Notifications by filtering IssuedBy without selecting NotificatioType filter | 00:00:01 |
| TC_PMS_GetAllNotifications_12 | Get All Notifications by filtering IssuedTo without selecting NotificatioType filter | 00:00:01 |
| TC_PMS_GetAllNotifications_24 | Fetch all API key expiry notifications that with invalid API key name | 00:00:01 |
| TC_PMS_GetAllNotifications_15 | Get All Notifications without Authorization Token | 00:00:01 |
| TC_PMS_GetAllNotifications_16 | Get All Notifications without partner admin role | 00:00:01 |
| DismissNotificationNegativeScenarios — Passed | ||
| TC_PMS_DismissNotificationNegativeScenarios_18 | Dismiss Notification with Empty Notification Status | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_07 | Dismiss Notification with Empty Request ID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_14 | Dismiss Notification with Empty Request Time param | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_02 | Dismiss Notification with Invalid NotificationID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_17 | Dismiss Notification with invalid Notification status | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_19 | Dismiss Notification with invalid Notification Status parameter as DISMISS | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_04 | Dismiss Notification with invalid Request ID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_12 | Dismiss Notification with Version value 0 parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_11 | Dismiss Notification with Version value 1 parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_10 | Dismiss Notification with Version parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_03 | Dismiss Notification with Null NotificationID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_06 | Dismiss Notification with Null Request ID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_09 | Dismiss Notification with Version parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_01 | Dismiss Notification without Authentication | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_05 | Dismiss Notification without Request ID | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_08 | Dismiss Notification with Version parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_16 | Dismiss Notification without object Parameter | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_15 | Dismiss Notification without Partner Admin role | 00:00:01 |
| TC_PMS_DismissNotificationNegativeScenarios_13 | Dismiss Notification without RequestTime parameter | 00:00:01 |
| UpdateNotificationSeenTimestamp — Passed | ||
| TC_PMS_UpdateNotificationSeenTimestamp_01 | Update Notification Seen Timestamp with valid details | 00:00:01 |
| UpdateNotificationSeenTimestampNegativeScenarios — Passed | ||
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_07 | Update Notification Seen Timestamp Empty RequestId param | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_14 | Update Notification Seen Timestamp Empty RequestTime | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_16 | Update Notification Seen Timestamp Empty notificationsSeenDtimes parameter | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_17 | Update Notification Seen Timestamp with Invalid partner admin role | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_04 | Update Notification Seen Timestamp with Invalid RequestId param | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_10 | Update Notification Seen Timestamp Invalid Version value | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_02 | Update Notification Seen Timestamp with invalid userID | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_06 | Update Notification Seen Timestamp Null RequestId param | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_09 | Update Notification Seen Timestamp Null Version value | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_03 | Update Notification Seen Timestamp with Null userID | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_12 | Update Notification Seen Timestamp Version value0 | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_11 | Update Notification Seen Timestamp Version value1 | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_01 | Update Notification Seen Timestamp without Authentication | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_08 | Update Notification Seen Timestamp without Version value | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_18 | Update Notification Seen Timestamp with Invalid partner admin role | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_15 | Update Notification Seen Timestamp without Object parameter | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_05 | Update Notification Seen Timestamp without RequestId param | 00:00:01 |
| TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_13 | Update Notification Seen Timestamp without RequestTime | 00:00:01 |
| GetNotificationsSeenTimestamp — Passed | ||
| TC_PMS_GetNotificationsSeenTimestamp_01 | Get Notifications Seen Timestamp | 00:00:01 |
| GetNotificationsSeenTimestampNegativeScenarios — Passed | ||
| TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_01 | Get Notifications Seen Timestamp with invalid userId | 00:00:01 |
| TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_03 | Get Notifications Seen Timestamp with invalid token | 00:00:01 |
| TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_02 | Get Notifications Seen Timestamp without Adminrole | 00:00:01 |
| GetPartnerExpiringCertificate — Passed | ||
| TC_PMS_GetPartnerExpiringCertificate_01 | Get Partner Expiring Certificates | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificate_04 | Get Partner Expiring Certificate with Expiry date 10 days | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificate_03 | Get Partner Expiring Certificate with Expiry date 15 days | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificate_02 | Get Partner Expiring Certificate with Expiry date 30 days | 00:00:01 |
| GetPartnerExpiringCertificateNegativeScenarios — Passed | ||
| TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_02 | Get Partner Expiring Certificates with invalid Role | 00:00:01 |
| TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_01 | Get Partner Expiring Certificates with invalid token | 00:00:01 |
| GetRootIntermediateExpiringCertificate — Passed | ||
| TC_PMS_GetRootIntermediateExpiringCertificate_01 | Get Root and Intermediate Expiring Certificates | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificate_04 | Get Root and Intermediate Expiring Certificates | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificate_03 | Get Root and Intermediate Expiring Certificates | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificate_02 | Get Root and Intermediate Expiring Certificates | 00:00:01 |
| GetRootIntermediateExpiringCertificateNegativeScenarios — Passed | ||
| TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_01 | Get Root Intermediate Expiring Certificates with invalid token | 00:00:01 |
| TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_02 | Get Root Intermediate Expiring Certificates with Partner Role | 00:00:01 |
| GetAllApiKeyForAuthPartnerV2 — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerV2_01 | Fetching all the API Key created by Authentication Partner by Partner Admin token | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_02 | Fetching all the API Key created by Authentication Partner | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_05 | Fetching all the API Key created by Authentication Partner Filter by pageNo | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_16 | Fetching all the API Key created by Authentication Partner Filter by Expiry period 10 days | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_15 | Fetching all the API Key created by Authentication Partner Filter by Expiry period 15 days | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_14 | Fetching all the API Key created by Authentication Partner Filter by Expiry period 30 days | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_12 | Fetching all the API Key created by Authentication Partner Filter by Status Activated | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_13 | Fetching all the API Key created by Authentication Partner Filter by Status Deactivated | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_03 | Fetching all the API Key created by Authentication Partner Filter by apiKeyLabel | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_04 | Fetching all the API Key created by Authentication Partner Filter by orgName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_06 | Fetching all the API Key created by Authentication Partner Filter by pageSize | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_07 | Fetching all the API Key created by Authentication Partner Filter by partnerId | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_08 | Fetching all the API Key created by Authentication Partner Filter by policyGroupName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_09 | Fetching all the API Key created by Authentication Partner Filter by policyName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_10 | Fetching all the API Key created by Authentication Partner Filter by sortFieldName and sortType Ascending | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2_11 | Fetching all the API Key created by Authentication Partner Filter by sortFieldName and sortType Descending | 00:00:01 |
| GetAllApiKeyForAuthPartnerV2NegativeScenarios — Passed | ||
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_02 | Fetching all the API Key created by Authentication Partner Filter by Device Partner token | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_03 | Fetching all the API Key created by Authentication Partner Filter by FTM Partner token | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_14 | Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_13 | Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_04 | Fetching all the API Key created by Authentication Partner Filter by Invalid apiKeyLabel | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_05 | Fetching all the API Key created by Authentication Partner Filter by Invalid orgName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_06 | Fetching all the API Key created by Authentication Partner Filter by Invalid pageNo | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_07 | Fetching all the API Key created by Authentication Partner Filter by Invalid pageSize | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_08 | Fetching all the API Key created by Authentication Partner Filter by Invalid partnerId | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_09 | Fetching all the API Key created by Authentication Partner Filter by Invalid policyGroupName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_10 | Fetching all the API Key created by Authentication Partner Filter by Invalid policyName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_12 | Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_11 | Fetching all the API Key created by Authentication Partner Filter by sortFieldName and without selecting pageno & pageSize | 00:00:01 |
| TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_01 | Fetching all the API Key created by Authentication Partner without Authentication for Partner Admin | 00:00:01 |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Active_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group2", "name": "mosip policy group2", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip draft policy group19234", "name": "mosip draft policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for draft policy, uniqueIdentifier=TC_PMS_definePolicyGroup_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc published mosip policy group19234", "name": "mosip published policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for published policy, uniqueIdentifier=TC_PMS_definePolicyGroup_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip delete before policy creation policy group19234", "name": "mosip delete before policy creation policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for draft policy, uniqueIdentifier=TC_PMS_definePolicyGroup_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc deactivate mosip policy group19234", "name": "mosip deactivate policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup for deactivate policy, uniqueIdentifier=TC_PMS_definePolicyGroup_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_For_Test_AuthTypeToken_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy group for AuthTypeToken", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_For_updatePolicy_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group for req key For Update", "name": "mosip policy group for req key For Update", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group19234", "name": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_AlreadyExists_InValid_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group19234", "name": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_014", "message": "Policy group exists with name : mosip policy group 19234" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_ForNeg_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy neg", "name": "mosip policy group neg", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_desc_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.desc" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy Group, uniqueIdentifier=TC_PMS_definePolicyGroup_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_name_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group", "name": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy Group, uniqueIdentifier=TC_PMS_definePolicyGroup_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Missing_InputParameter_requesttime_neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group 1233", "name": "mosip policy group 1233", "requesttime": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004", "message": "Invalid request time" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a policy group with missing request time, uniqueIdentifier=TC_PMS_definePolicyGroup_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_PastDate_Request_Time_Neg, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group192345", "name": "mosip policy group 192345", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006", "message": "Request date should be current date" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup with invalid request time, uniqueIdentifier=TC_PMS_definePolicyGroup_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_UpdatePolicyGroupForPartner_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc update policy group", "name": "update_policy_group", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_Without_Auth_neg, endPoint=/v1/policymanager/policies/group/new, role=temp, templateFields=null, input={ "desc": "desc mosip policy group192345", "name": "mosip policy group 192345", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-403", "message": "Forbidden" } ] }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a policy group, uniqueIdentifier=TC_PMS_definePolicyGroup_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group1923456789", "name": "mosip policy group1923456789", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_create_then_deactivateAll_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group1923456", "name": "mosip policy group1923456", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicyGroup_for_Get_ApiKey_With_Deactive_Partner_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies/group/new, role=partneradmin, templateFields=null, input={ "desc": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "name": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "requesttime": "$TIMESTAMP$" }, output= { "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": true }, inputTemplate=pms/DefinePolicyGroup/definePolicyGroup, outputTemplate=pms/DefinePolicyGroup/definePolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a PolicyGroup, uniqueIdentifier=TC_PMS_definePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyGroup_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$" }, output={ "desc": "desc mosip policy group19234", "isActive": true, "name": "mosip policy group 19234" }, inputTemplate=pms/policy/GetPolicyGroup/getPolicyGroup, outputTemplate=pms/policy/GetPolicyGroup/getPolicyGroupResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Parter Policy Group, uniqueIdentifier=TC_PMS_getPolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyGroup_By_Invalid_policyGroupId, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "policyGroupId": "policygroup-id-00001" }, output={ "errors": [ { "errorCode": "PMS_POL_016" } ] }, inputTemplate=pms/policy/GetPolicyGroup/getPolicyGroup, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Parter Policy Group with invalid PolicyGroupId, uniqueIdentifier=TC_PMS_getPolicyGroup_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_All_Valid, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": false, "desc": "desc mosip policy group20", "name": "mosip policy group20", "policyGroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output= { "name": "mosip policy group20", "desc": "desc mosip policy group20", "is_Active": false }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroupResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group with valid details, uniqueIdentifier=TC_PMS_updatePolicyGroup_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_Invalid_InputParameter_policyGroupId, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "desc mosip policy group", "name": "mosip policy group", "policyGroupId": "1234abcxyz", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group while keeping PolicyGroupID parameter as invalid, uniqueIdentifier=TC_PMS_updatePolicyGroup_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_Missing_InputParameter_desc, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "$REMOVE$", "name": "mosip policy group neg4", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.desc" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group while keeping PolicyGroupID parameter as missing and filter data in descending order, uniqueIdentifier=TC_PMS_updatePolicyGroup_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_Missing_InputParameter_isActive, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": "$REMOVE$", "desc": "desc mosip policy group neg4", "name": "mosip policy group neg4", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group while keeping isActive parameter as missing, uniqueIdentifier=TC_PMS_updatePolicyGroup_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_Missing_InputParameter_name, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "desc mosip policy group", "name": "$REMOVE$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group while keeping Name parameter as missing, uniqueIdentifier=TC_PMS_updatePolicyGroup_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_activate_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": true, "desc": "desc mosip policy group updated", "name": "mosip policy group", "policyGroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output= { "name": "mosip policy group", "desc": "desc mosip policy group updated", "is_Active": true }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroupResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group as Activate with valid details, uniqueIdentifier=TC_PMS_updatePolicyGroup_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroup_deactivate_All_Valid, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partner, templateFields=null, input={ "isActive": false, "desc": "desc mosip policy group deactivate", "name": "mosip policy group deactivate", "policyGroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output= { "name": "mosip policy group deactivate", "desc": "desc mosip policy group deactivate", "is_Active": false }, inputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroup, outputTemplate=pms/policy/UpdatePolicyGroup/updatePolicyGroupResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group as Deactivate with valid details, uniqueIdentifier=TC_PMS_updatePolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroupBeforePolicyCreation_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$" }, output= { "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_DeleteBeforePolicyCreation_pms_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroupBeforePolicyCreation/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroupBeforePolicyCreation/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group before policy is created, uniqueIdentifier=TC_PMS_DeactivatePolicyGroupBeforePolicyCreation_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Draft_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc draft mosip policy 19234", "name": "mosip draft policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip draft policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip draft policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_InProgressMapping_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc in progress mapping mosip policy 19234", "name": "mosip in progress mapping policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Published_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc published mosip policy 19234", "name": "mosip published policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip published policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip published policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Reject_Policy_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc reject mosip policy 19234", "name": "mosip reject policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Blank, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy for invalid AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Invalid_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "kjh54", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy For invalid AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Null_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "null", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy for auth token type null, uniqueIdentifier=TC_PMS_definePolicy_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Policy, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "Policy", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy for authtoken type policy, uniqueIdentifier=TC_PMS_definePolicy_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_For_Test_AuthTypeToken_Space, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": " ", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy for AuthTypeToken space, uniqueIdentifier=TC_PMS_definePolicy_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc deactive mosip policy 19234", "name": "mosip deactive policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip deactivate policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip deactivate policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group 19234", "name": "mosip policy", "desc": "desc mosip policy", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/policy/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get API key for deactivated SID, uniqueIdentifier=TC_PMS_definePolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_All_Valid_Smoke_pms_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy 19234", "name": "mosip policy 19234", "attributeName": "fullName", "authTokenType": "policy", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group 19234", "name": "$IGNORE$", "desc": "$IGNORE$", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Policy using PolicyGroup, uniqueIdentifier=TC_PMS_definePolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_DemoAuth_With_Same_Policy_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy 19234", "authSubType": "FINGER", "authType": "demo", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_009", "message": "$IGNORE$" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy with same policyname, uniqueIdentifier=TC_PMS_definePolicy_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_authTokenType_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg2", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$REMOVE$", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy without authtoken type, uniqueIdentifier=TC_PMS_definePolicy_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_authType_neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg", "authSubType": "FINGER", "authType": "$REMOVE$", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without authtype, uniqueIdentifier=TC_PMS_definePolicy_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_descNeg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy withput input parameter, uniqueIdentifier=TC_PMS_definePolicy_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_mandatory_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy group Neg 1", "authSubType": "FINGER", "authType": "bio", "mandatory": $REMOVE$, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "allowedKycAttributes": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy, uniqueIdentifier=TC_PMS_definePolicy_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_name_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "$REMOVE$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy missing input parameter, uniqueIdentifier=TC_PMS_definePolicy_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_policyGroupName, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$REMOVE$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy without policygroupname, uniqueIdentifier=TC_PMS_definePolicy_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Missing_InputParameter_policyType, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "$REMOVE$", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without policy type, uniqueIdentifier=TC_PMS_definePolicy_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_PolicyGrpInActive_InValid_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy 192345", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip delete before policy creation policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_053" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy for Inactive policy group, uniqueIdentifier=TC_PMS_definePolicy_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_PolicyGrpNotExists_InValid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "asbgdfg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_019" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy for non existing policygroup, uniqueIdentifier=TC_PMS_definePolicy_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_RandomTokenType_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy2", "name": "mosip policy2 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": false, "attributeName": "string", "authTokenType": "random", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip policy2", "desc": "desc mosip policy2", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/policy/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy for random AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_Remove_Demo_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy5", "name": "mosip policy5 Neg", "authSubType": "FINGER", "authType": "$REMOVE$", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicyNeg, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define Policy without demo, uniqueIdentifier=TC_PMS_definePolicy_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_demo_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "demo", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group neg", "name": "mosip policy9 Neg", "desc": "desc mosip policy9", "is_Active": false }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/DefinePolicy/definePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy, uniqueIdentifier=TC_PMS_definePolicy_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_when_authTokenType_invalid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "162g@fsgs", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy with invalid authtokentype, uniqueIdentifier=TC_PMS_definePolicy_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_when_authTokenType_missing, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$REMOVE$", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without authtoken type, uniqueIdentifier=TC_PMS_definePolicy_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_when_authTokenType_null, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy9", "name": "mosip policy9 Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Define policy without authtoken type, uniqueIdentifier=TC_PMS_definePolicy_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefinePolicy_without_AuthTypeToken, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group AuthTypeToken", "name": "mosip policy AuthTypeToken Neg", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$IGNORE$", "policyGroupName": "mosip policy group neg", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/DefinePolicy/definePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=DefinePolicy without AuthTypeToken, uniqueIdentifier=TC_PMS_definePolicy_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policy", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy with valid details, uniqueIdentifier=TC_PMS_defineDataSharePolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_All_for_Update_smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy group for req key For Update", "name": "mosip policy group for req key For Update", "policyId": "MDSPFU", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policy", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy for update partner, uniqueIdentifier=TC_PMS_defineDataSharePolicy_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_All_for_req_ApiKey_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy ApiKey", "name": "mosip data share policy ApiKey", "policyId": "MDSPFA", "policyGroupName": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "name": "mosip data share policy", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy for requested API Key, uniqueIdentifier=TC_PMS_defineDataSharePolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_AttributeName_Custom_Name_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyk", "policyId": "MDSPm", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"custom name", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policyk", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping AttributeName parameter as custome name value, uniqueIdentifier=TC_PMS_defineDataSharePolicy_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_Cancelling_the_create_dataSharePolicy, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy name", "policyId": "MDSP239fhfdndn", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policy name", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while Cancelling the created dataSharePolicy, uniqueIdentifier=TC_PMS_defineDataSharePolicy_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_EncryptionType_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyh", "policyId": "MDSPHH", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "none", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policyh", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping EncryptionType parameter as none value, uniqueIdentifier=TC_PMS_defineDataSharePolicy_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_InActive_policyGroup, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip delete before policy creation policy group 19234", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_053" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy for inactive Policy Group, uniqueIdentifier=TC_PMS_defineDataSharePolicy_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_IndividualBiometrics_Attribute, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyb", "policyId": "MDSPB", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"individualBiometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policyb", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping attributeName parameter as IndividualBiometrics, uniqueIdentifier=TC_PMS_defineDataSharePolicy_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_RemovedAttribute_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy7", "name": "mosip data share policy7", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"$REMOVE$", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping AttributeName parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_ToCheckStatus_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy check status", "name": "mosip data share policy to check status22", "policyId": "MDSP8", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policy to check status22", "desc": "mosip policy group", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy To check status, uniqueIdentifier=TC_PMS_defineDataSharePolicy_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_WithoutMandatoryFields_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy2", "name": "mosip data share policy2", "policyId": "MDSP2", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"$REMOVE$", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policy2", "desc": "mosip data share policy2", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy Without Mandatory Fields, uniqueIdentifier=TC_PMS_defineDataSharePolicy_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_Zipcode_Attribute, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyd", "policyId": "MDSPC", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"Zipcode", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policyd", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping attributeName parameter as Zipcode, uniqueIdentifier=TC_PMS_defineDataSharePolicy_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_duplicate_policy_name, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_009" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy with duplicate Policy name, uniqueIdentifier=TC_PMS_defineDataSharePolicy_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_format_SpaceVal_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policya", "policyId": "MDSPA", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":" ", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policya", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping Format parameter with spaces value, uniqueIdentifier=TC_PMS_defineDataSharePolicy_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_invalid_policy_grp_name, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "abcd", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_019" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping invalid Policy Group name, uniqueIdentifier=TC_PMS_defineDataSharePolicy_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_invalid_policy_type, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "abcd", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_023" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping invalid Policy Type, uniqueIdentifier=TC_PMS_defineDataSharePolicy_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_missing_PolicyGrpName, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "$REMOVE$", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping Policy Group Name parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_missing_PolicyType, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "$REMOVE$", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping Policy Type parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_missing_descr, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip data share policy", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping description parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_missing_name, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "$REMOVE$", "policyId": "MDSP", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "attributeName":"biometrics", "version": "1.0", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping name parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_shareDomain_https_Smoke, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyg", "policyId": "MDSPGG", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "https", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "policyGroupName": "mosip policy group", "name": "mosip data share policyg", "desc": "mosip data share policy", "is_Active": false }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping shareDomain parameter as https, uniqueIdentifier=TC_PMS_defineDataSharePolicy_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_typeOfShare_Direct_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyf", "policyId": "MDSPEE", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Direct", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping typeOfShare parameter as Direct value, uniqueIdentifier=TC_PMS_defineDataSharePolicy_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_typeOfShare_Remove_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policyi", "policyId": "MDSPEE", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "$REMOVE$", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_006" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping typeOfShare parameter as Empty, uniqueIdentifier=TC_PMS_defineDataSharePolicy_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_typeOfShare_SpaceVal_Neg, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policye", "policyId": "MDSPDD", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": " ", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy while keeping typeofShare parameter with spaces value, uniqueIdentifier=TC_PMS_defineDataSharePolicy_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DefineDataSharePolicy_without_policyId, endPoint=/v1/policymanager/policies, role=partneradmin, templateFields=null, input={ "desc": "mosip data share policy", "name": "mosip data share policy without policy id", "policyId": "$REMOVE$", "policyGroupName": "mosip policy group", "policyType": "DataShare", "format":"extraction", "typeOfShare": "Data Share", "validForInMinutes": "30", "transactionsAllowed": "2", "encryptionType": "Partner Based", "shareDomain": "datashare-service", "source": "Packet Manager", "attributeName":"biometrics", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PV_005" } ] }, inputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicy, outputTemplate=pms/policy/DefineDataSharePolicy/defineDataSharePolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data Share Policy without PolicyId, uniqueIdentifier=TC_PMS_defineDataSharePolicy_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Invalid_InputParameter_policyID, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "1234abcxz", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy while keeping InputParameter as invalid for PolicyID, uniqueIdentifier=TC_PMS_createUpdatePolicy_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Invalid_PolicyID, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "asfgref", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy with invalid PolicyID, uniqueIdentifier=TC_PMS_createUpdatePolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Invalid_PolicygroupName, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "asfgrrw", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_019", "message": "Policy group name does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy with invalid PolicyGroupName, uniqueIdentifier=TC_PMS_createUpdatePolicy_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_authTokenType_neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy missing neg", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "$REMOVE$", "policyGroupName": "mosip policy group 19234", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PV_006", "message": "Missing input parameter - authTokenType" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy while keeping authTokeType Parameter as Empty, uniqueIdentifier=TC_PMS_createUpdatePolicy_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_desc, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "$REMOVE$", "name": "mosip policy", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.desc" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy while keeping InputParameter as empty, uniqueIdentifier=TC_PMS_createUpdatePolicy_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_name, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "$REMOVE$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "mosip policy group", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.name" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy with invalid PolicyParameterName, uniqueIdentifier=TC_PMS_createUpdatePolicy_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicy_Missing_InputParameter_policyGroupName_neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "desc": "desc mosip policy", "name": "mosip policy", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "authSubType": "FINGER", "authType": "bio", "mandatory": true, "attributeName": "string", "authTokenType": "partner", "policyGroupName": "$REMOVE$", "policyType": "Auth", "version": "1.0", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.policyGroupName" } ] }, inputTemplate=pms/policy/UpdatePolicy/updatePolicy, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy while keeping PolicyGroupName Parameter as Empty, uniqueIdentifier=TC_PMS_createUpdatePolicy_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_Active_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"active", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_054", "message": "Cannot activate unpublished policy." } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status as Active with invalid data, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_DeActive_auth_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"De-Active", "requesttime": "$TIMESTAMP$" }, output= { "message": "status updated successfully" }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatusResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status as DeActive, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_DeActive_datashare_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "MDSP", "policygroupId":"$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "status":"De-Active", "requesttime": "$TIMESTAMP$" }, output= { "message": "status updated successfully" }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatusResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status as DeActive for datashare, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_Missing_status_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status while keeping status parameter as empty, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_PolicyGroupId_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"asfbvef", "status":"Active", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_016", "message": "Policy Group ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status while keeping PolicyGroupId parameter as invalid, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_PolicyId_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "asfgv", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"Active", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status as Active with invalid PolicyID, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyStatus_status_InValid, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "policygroupId":"$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "status":"asfg", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_POL_045", "message": "Policy Status either Active or De-active." } ] }, inputTemplate=pms/policy/UpdatePolicyStatus/updatePolicyStatus, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Status while keeping status parameter as invalid, uniqueIdentifier=TC_PMS_UpdatePolicyStatus_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PublishDataSharePolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_Active_All_Valid_Smoke_sid_id$", "policyId": "MDSP", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "DataShare", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_ForInProgressPolicyMapping, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_For_InProgressMapping_Policy_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy for rejecting partner policy mapping request, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_ForRejectPolicyMapping, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_For_Reject_Policy_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy for rejecting partner policy mapping request, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_Smoke_ForNeg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_All_Valid_forDeactivatePolicyGroup_ForNeg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_For_Published_Policy_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy for deactivate policy group with published policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_ForDeactive_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupName": "$IGNORE$", "policyGroupDesc": "$IGNORE$", "policyGroupStatus": true, "policyName": "$IGNORE$", "policyDesc": "$IGNORE$", "policyType": "Auth", "status": "PUBLISHED", "is_Active": true, "authType": "$IGNORE$", "authSubType": "$IGNORE$", "mandatory": "$IGNORE$", "attributeName": "$IGNORE$", "authTokenType": "$IGNORE$" }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/PublishPolicy/publishPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_InValid_AlreadyPublished_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_020" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy which is already published, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_InValid_policyId_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "afgrwfg", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_008" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy with invalid policyid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_InValid_policygroupId_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=partneradmin, templateFields=null, input={ "policygroupId": "sgdasfgbv", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_016" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy with invalid policygroupid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PublishPolicy_invalid_auth_neg, endPoint=/v1/policymanager/policies/{policyId}/group/{policygroupId}/publish, role=invalidtoken, templateFields=null, input={ "policygroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_pms_sid_id$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/PublishPolicy/publishPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Publish The Policy without access token, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllActivePolicyGroups_All_Valid_Smoke, endPoint=/v1/policymanager/policies/policy-groups, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroupsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active PolicyGroups, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllActivePolicyGroups_Invalid_auth, endPoint=/v1/policymanager/policies/policy-groups, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active PolicyGroups with invalid token, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllActivePolicyGroups_without_auth, endPoint=/v1/policymanager/policies/policy-groups, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllActivePolicyGroups/getAllActivePolicyGroups, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active PolicyGroups without token, uniqueIdentifier=TC_PMS_GetAllActivePolicyGroups_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicy_All_Valid_Smoke_sid, endPoint=/v1/policymanager/policies/{policyId}, role=partner, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output= { "policyGroupName": "mosip policy group 19234", "policyGroupDesc": "desc mosip policy group19234", "policyGroupStatus": true, "policyName": "mosip policy 19234", "policyDesc": "desc mosip policy 19234", "authTokenType": "partner" }, inputTemplate=pms/policy/GetPolicy/getPolicy, outputTemplate=pms/policy/GetPolicy/getPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Parter Policy, uniqueIdentifier=TC_PMS_getPolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicy_Invalid_InputParameter_policyId, endPoint=/v1/policymanager/policies/{policyId}, role=partner, templateFields=null, input={ "policyId": "policy123456" }, output={ "errors": [ { "errorCode": "PMS_POL_008", "message": "Policy ID does not exist" } ] }, inputTemplate=pms/policy/GetPolicy/getPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Parter Policy with invalid PolicyId, uniqueIdentifier=TC_PMS_getPolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_AllValid_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "policyType": "DataShare", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy with valid details, uniqueIdentifier=TC_PMS_createSearchPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_Only_FilterCriteria_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Data Share2" } ], "policyType": "DataShare", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_Only_PaginationCriteria_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "policyType": "DataShare", "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchPartner_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_Only_SortaCriteria_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchPartner_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_Valid_Smoke, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "policyType": "DataShare", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy with valid details, uniqueIdentifier=TC_PMS_createSearchPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_contains_Smoke_asc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "data share" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "version": "1.0", "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPartner_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_contains_Smoke_desc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "data share" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "version": "1.0", "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as contains and filter the data in descending order, uniqueIdentifier=TC_PMS_createSearchPartner_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_equals_Smoke_asc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "mosip data share policy" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as Equals and filter the data in ascending order, uniqueIdentifier=TC_PMS_createSearchPartner_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_equals_Smoke_desc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "mosip data share policy" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as Equals and filter the data in descending order, uniqueIdentifier=TC_PMS_createSearchPartner_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_startswith_Smoke_asc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as Startswith and filter the data in ascending order, uniqueIdentifier=TC_PMS_createSearchPartner_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_type_startswith_Smoke_desc, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "version": "1.0", "policyType": "DataShare", "schema": "$IGNORE$" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as Startswith and filter the data in descending order, uniqueIdentifier=TC_PMS_createSearchPartner_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_columnName, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "n@@@@@343e", "type": "startswith", "value": "Data Share2" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping columnName parameter, uniqueIdentifier=TC_PMS_createSearchPartner_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_sort_field, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "n@@@@3334$$$e", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping sortField parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartner_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_sort_type, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Data Share2" } ], "sort": [ { "sortField": "name", "sortType": "dc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping sortType parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartner_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_value_contains, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": ")()()****$$$$$$$$$$)))" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping value parameter as invalid and filter the data in descending order, uniqueIdentifier=TC_PMS_createSearchPartner_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_value_equals, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "Da@@3344" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping value parameter as invalid and Type parameter as Equals, uniqueIdentifier=TC_PMS_createSearchPartner_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_invalid_value_startswith, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Da@@3344" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/policy/Search/searchPolicyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping value parameter as invalid and Type parameter as startswith, uniqueIdentifier=TC_PMS_createSearchPartner_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_missing_columnName, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS_COR_003" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping columnName parameter as Empty, uniqueIdentifier=TC_PMS_createSearchPartner_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_missing_sort_field, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Data Share2" } ], "sort": [ { "sortField": "$REMOVE$", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping sortField parameter as Empty, uniqueIdentifier=TC_PMS_createSearchPartner_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_missing_sort_type, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "mosip" } ], "sort": [ { "sortField": "name", "sortType": "$REMOVE$" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping sortType parameter as Empty, uniqueIdentifier=TC_PMS_createSearchPartner_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicy_with_missing_type, endPoint=/v1/policymanager/policies/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "$REMOVE$", "value": "Data Share2" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "policyType": "DataShare", "pageFetch": "5", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312" } ] }, inputTemplate=pms/policy/Search/searchPolicy, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy while keeping Type parameter as Empty, uniqueIdentifier=TC_PMS_createSearchPartner_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_PrintPartner_AllValid_Smoke, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "mosipprint@gmail.com", "organizationName": "mosipprint", "partnerId": "mosipprint", "partnerType": "Print_Partner", "policyGroup":"mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "mosipprint", "status": "InProgress" }, inputTemplate=pms/PrintPartner/CreatePartner/createPartner, outputTemplate=pms/PrintPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Print Partner Self Registration with valid details, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_PrintPartner_DublicateEmail_Neg, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "mosipprint@gmail.com", "organizationName": "mosipprint", "partnerId": "mosipprint", "partnerType": "Print_Partner", "policyGroup":"mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/PrintPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Print Partner Self Registration with duplicate Email, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_PrintPartner_SpaceIn_PartnerId_Neg, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "mosipprsint@gmail.com", "organizationName": "mosipprint", "partnerId": "mosip print", "partnerType": "Print_Partner", "policyGroup":"mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_066" } ] }, inputTemplate=pms/PrintPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Print Partner Self Registration while keeping SpaceIn PartnerId, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "status": "Upload Success." }, inputTemplate=pms/PrintPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/PrintPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA Certificate for Print Partner, uniqueIdentifier=TC_PMS_uploadCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/PrintPartner/UploadCert/uploadCert, outputTemplate=pms/PrintPartner/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Print Partner Certificate, uniqueIdentifier=TC_PMS_UploadPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePrintPartner_AllValid_smoke, endPoint=/v1/partnermanager/partners/v2/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "mosipprint", "address": "Benglore", "contactNumber": "9876453210", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "mosipprint", "status": "approved" }, inputTemplate=pms/PrintPartner/UpdatePrintPartner/UpdatePrintPartner, outputTemplate=pms/PrintPartner/UpdatePrintPartner/UpdatePrintPartnerResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Print Partner with valid details, uniqueIdentifier=TC_PMS_UpdatePrintPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerDetails_allValid_smoke, endPoint=/v1/partnermanager/partners/v2, role=partner, templateFields=null, input={ "partnerType":"Print_Partner" }, output={ }, inputTemplate=pms/PrintPartner/GetPartnerDetails/GetPartnerDetails, outputTemplate=pms/PrintPartner/GetPartnerDetails/GetPartnerDetailsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Print Partner Details, uniqueIdentifier=TC_PMS_GetPartnerDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_withoutPartnerRegister_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Without Partner Register, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerWithoutPartnerRegister_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_BeforePartnerCreate_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_All_for_Get_ApiKey_With_Deactive_Partner_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosipsfgh@gmail.com", "organizationName": "Techno", "partnerId": "Tech-1233", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "Tech-1233", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with Deactivated Partner ID, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_AlreadyExisting_Policy_Name, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosippp@gmail.com", "organizationName": "Techno", "partnerId": "pms-111999", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_051" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with Already Existing Policy Name, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_AlreadyExists_invalid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip2@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111999", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_051" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with Already Existing Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Deactive_Partner_sid, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosipgh@gmail.com", "organizationName": "Techno", "partnerId": "Tech-321", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group for req key For_Req_Key_deactivaed_Policy", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "Tech-321", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with Deactivated Partner ID, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_InActive_policyGroup, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mmo@gmail.com", "organizationName": "Techno", "partnerId": "Tech-3241", "partnerType": "Auth_Partner", "policyGroup": "mosip delete before policy creation policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PMP_023" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with Policy Group, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_PartnerId, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "$REMOVE$", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion while keeping the PartnerID parameter as missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_address, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "$REMOVE$", "contactNumber": "8553967572", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion while keeping the address parameter as missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_contactNumber, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "$REMOVE$", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion while keeping the Contact Number parameter as missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_emailId, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "$REMOVE$", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion while keeping the emailID parameter as missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_Missing_InputParameter_partnerType, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech-123", "partnerType": "$REMOVE$", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion while keeping the PartnerType parameter as missing, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_SpaceVAl_PartnerId_Neg, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "moosip@gmail.com", "organizationName": "Techno", "partnerId": "Tech -123", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_066" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion with invalid PartnerID, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_PartnerSelfRegistration_UpdatePolicyGroupForPartner_AllValid_Smoke, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "update@gmail.com", "organizationName": "Test", "partnerId": "updatepolicy", "partnerType": "Auth_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "updatepolicy", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Self Registrartion and update Policy Group for Partner with valid data, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistrationFor_PartnerAdmin_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partneradmin, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763admin@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111777", "partnerType": "FTM_Provider", "policyGroup": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111777", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111999", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111999", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Device_provider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partnerdevice, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98768@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111998", "partnerType": "Device_Provider", "policyGroup": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111998", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Ftm_provider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partnerftm, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98788@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111888", "partnerType": "FTM_Provider", "policyGroup": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111888", "status": "InProgress" }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Missing_Email_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "organizationName": "PMS_API_ABC_ORG", "partnerId": "1119911", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Missing_Request_Time_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763125@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "1119910", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner with missing request time, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_PastDate_Request_Time_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763123@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "11199911", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner with invalid request time, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_reuse_same_Email_Neg, endPoint=/v1/partnermanager/partners, role=partnerauth, templateFields=null, input={ "address": "Bangalore", "contactNumber": "8553967572", "emailId": "mosip98763@gmail.com", "organizationName": "PMS_API_ABC_ORG", "partnerId": "pms-111999", "partnerType": "AUTH_PARTNER", "policyGroup": "mosip policy group 19234", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating a Partner, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "movp@gmail.com", "organizationName": "movp", "partnerId": "MOVP-AUTOMATION", "partnerType": "Credential_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "MOVP-AUTOMATION", "status": "InProgress" }, inputTemplate=pms/credentialPartner/CreatePartner/createPartner, outputTemplate=pms/credentialPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner self Registrartion with Valid data, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_Same_Email, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "movp@gmail.com", "organizationName": "movp", "partnerId": "MOVP-AUTOMATION", "partnerType": "Credential_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_PRT_011" } ] }, inputTemplate=pms/credentialPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner self Registrartion with existing Email, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_WithOut_Mandatory_Neg, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "movp@gmail.com", "organizationName": "movp", "partnerId": "$REMOVE$", "partnerType": "Credential_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/credentialPartner/CreatePartner/createPartner, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner self Registrartion without PartnerID, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_withoutuploadCert_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Without Partner Register, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_Device_Provider_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_Ftm_Provider_AllValid_smoke, endPoint=/v1/partnermanager/partners/email/verify, role=partnerftm, templateFields=null, input={ "emailId": "mosip98788@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "emailExists": true }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_invalid_email_neg, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "gfhgytth", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_missing_email_neg, endPoint=/v1/partnermanager/partners/email/verify, role=partnerauth, templateFields=null, input={ "emailId": "", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_012" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_VerifyPartnersEmail_without_auth_neg, endPoint=/v1/partnermanager/partners/email/verify, role=invalidtoken, templateFields=null, input={ "emailId": "mosip98763@gmail.com", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/VerifyPartnersEmail/verifyPartnersEmail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Verify Partners Email, uniqueIdentifier=TC_PMS_VerifyPartnersEmail_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificateBeforeCertificateUpload_Neg, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "30" }, output={ "isCertificateAvailable": false }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateBeforeCertificateUpload, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateBeforeCertificateUploadResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificates Before Certificate Upload, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateAuthCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_UploadAgain_Neg, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-PCM-003" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate2, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert which is already uploaded, uniqueIdentifier=TC_PMS_UploadCACertificate_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_with_blank_data, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate4, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert with blank data, uniqueIdentifier=TC_PMS_UploadCACertificate_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_with_invalid_data, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-CRY-003" } ] }, inputTemplate=pms/UploadCACertificate/uploadCertificate3, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=KER-CRY-003,KER-KMS-013, kycFields=null, description=Upload CA Cert with invalid data, uniqueIdentifier=TC_PMS_UploadCACertificate_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificateDeviceProvider_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateDeviceCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificate_Ftm_Provider_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateFtmCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSubCACertificate_DeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateDeviceSubCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Sub-CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSubCACertificate_Ftm_Provider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateFtmSubCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Sub-CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSubCACertificate_with_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partneradmin, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadCACertificate/uploadCertificateAuthSubCa, outputTemplate=pms/UploadCACertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Sub-CA Cert, uniqueIdentifier=TC_PMS_UploadCACertificate_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_BeforeCACertificates_upload_neg, endPoint=/v1/partnermanager/partners/trust-chain-certificates?pageNo=0&pageSize=8&issuedTo=PMS_API_CA&issuedBy=PMS_API_CA, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the Logged in Partner, uniqueIdentifier=TC_PMS_GetAllCertificateBeforeCACertificateUpload_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_before_certificate_upload, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerauth, templateFields=null, input={ "partnerId": "pms-111999" }, output={ "errors": [ { "errorCode": "PMS_PRT_108" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates before certificate upload, uniqueIdentifier=TC_PMS_getPartner_certificate_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert, uniqueIdentifier=TC_PMS_uploadPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_UploadAgain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCert, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload partner certificate again, uniqueIdentifier=TC_PMS_uploadPartnerCert_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_invalid_Domain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-PCM-011" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert4, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert by giving invalid domain, uniqueIdentifier=TC_PMS_uploadPartnerCert_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_invalid_certificate_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-KMS-013" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert3, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert by giving invalid cert data, uniqueIdentifier=TC_PMS_uploadPartnerCert_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_missing_PartnerDomain_Neg, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UploadPartnerCert/uploadCert2, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert without partnerdomain, uniqueIdentifier=TC_PMS_uploadPartnerCert_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_uploadCertificateDeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCertDeviceProvider, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert, uniqueIdentifier=TC_PMS_uploadPartnerCert_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadPartnerCert_uploadCertificateFtmProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partnerftm, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/UploadPartnerCert/uploadCertFtmProvider, outputTemplate=pms/UploadPartnerCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Partner Cert, uniqueIdentifier=TC_PMS_uploadPartnerCert_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_AuthPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerauth, templateFields=null, input={ "partnerId": "pms-111999" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_DeviceProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerdevice, templateFields=null, input={ "partnerId": "pms-111998" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_FtmProvider_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerftm, templateFields=null, input={ "partnerId": "pms-111888" }, output= { }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_with_unregistered_partner_neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partnerauth, templateFields=null, input={ "partnerId": "848484848" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetCertificate/getCert, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=TC_PMS_GetPartnerCert_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_Device_allValid_smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ }, output={ "partnerId": "pms-111998", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/GetAllCertificate/getAllCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the Loggedin Partner, uniqueIdentifier=TC_PMS_GetAllCertificate_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_allValid_smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerauth, templateFields=null, input={ }, output={ "partnerId": "pms-111999", "partnerType": "Auth_Partner", "isCertificateAvailable": true }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/GetAllCertificate/getAllCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the Logged in Partner, uniqueIdentifier=TC_PMS_GetAllCertificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_invalid_auth, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the partner invalid partner, uniqueIdentifier=TC_PMS_GetAllCertificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllCertificate_without_auth, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllCertificate/getAllCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API certificates of the partner without login, uniqueIdentifier=TC_PMS_GetAllCertificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePartnerDetails_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/pms-111999, role=partner, templateFields=null, input={ "address": "Bangalore Ind", "contactNumber": "8553967576", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "pms-111999", "status": "approved" }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/UpdatePartner/updatePartnerResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Partner Details for Partner with valid data, uniqueIdentifier=TC_PMS_updatePartnerDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePartnerDetails_Missing_InputParameter_Address, endPoint=/v1/partnermanager/partners/Tech-123, role=partner, templateFields=null, input={ "address": "$REMOVE$", "contactNumber": "8553967576", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Partner Details for Partner while keeping Address parameter as missing, uniqueIdentifier=TC_PMS_updatePartnerDetails_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePartnerDetails_Missing_InputParameter_contactNumber, endPoint=/v1/partnermanager/partners/Tech-123, role=partner, templateFields=null, input={ "address": "Bangalore Ind", "contactNumber": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Partner Details for Partner while keeping Contact Number parameter as missing, uniqueIdentifier=TC_PMS_updatePartnerDetails_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePartnerDetails_invalid_partnerId, endPoint=/v1/partnermanager/partners/Tech-1231234, role=partner, templateFields=null, input={ "address": "Bangalore Ind", "contactNumber": "8553967576", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/UpdatePartner/updatePartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Partner Details for Partner with invalid partnerID, uniqueIdentifier=TC_PMS_updatePartnerDetails_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/credentialPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/credentialPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Certificate for Partner, uniqueIdentifier=TC_PMS_uploadCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_with_invalid_certs_data, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { "errors": [ { "errorCode": "KER-CRY-003" } ] }, inputTemplate=pms/credentialPartner/UploadCertificate/uploadInvalidCertificate, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload CA Certificate for Partner with invalid certificate data, uniqueIdentifier=TC_PMS_uploadCert_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/credentialPartner/UploadCertificate/uploadSUBCACertificate, outputTemplate=pms/credentialPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload SUBCA Certificate for Partner, uniqueIdentifier=TC_PMS_uploadCert_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/credentialPartner/UploadCert/uploadCert, outputTemplate=pms/credentialPartner/UploadCert/uploadCertResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid Partner certificate for Partner, uniqueIdentifier=TC_PMS_uploadPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MOVP-AUTOMATION" }, output= { "partnerID": "MOVP-AUTOMATION", "errors": "[]" }, inputTemplate=pms/credentialPartner/GetPartner/getPartner, outputTemplate=pms/credentialPartner/GetPartner/getPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive Partner details, uniqueIdentifier=TC_PMS_getPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartner_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "abcd" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/credentialPartner/GetPartner/getPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive Partner details with invalid PartnerID, uniqueIdentifier=TC_PMS_getPartnerCert_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partner, templateFields=null, input={ "partnerId": "MOVP-AUTOMATION" }, output= { }, inputTemplate=pms/credentialPartner/GetCertificate/getCert, outputTemplate=pms/credentialPartner/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive Partner certificate, uniqueIdentifier=TC_PMS_getPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_allValid_smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ "partnerId": "pms-111999" }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerIdResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_invalid_auth, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id with invalid token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerId_without_auth, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedPartnerId/getAllApprovedPartnerId, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all approved Partner Id without token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerId_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_BeforePolicyMapping_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Before Policy Mapping, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerBeforePolicyMapping_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/pms-111999/contact/add, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9903255448", "emailId": "print@email.com", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Contact details for Partner with Valid data, uniqueIdentifier=TC_PMS_AddContact_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_Missing_InputParameter_address, endPoint=/v1/partnermanager/partners/pms-111999/contact/add, role=partner, templateFields=null, input={ "address": "$REMOVE$", "contactNumber": "9903255448", "emailId": "print@email.com", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - value is empty or null :request.address" } ] }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create contact details for the Partner while keeping the address parameter as missing, uniqueIdentifier=TC_PMS_AddContact_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_Missing_InputParameter_contactNumber, endPoint=/v1/partnermanager/partners/pms-111999/contact/add, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "$REMOVE$", "emailId": "print@email.com", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create contact details for the Partner while keeping the contactNumber parameter as missing, uniqueIdentifier=TC_PMS_AddContact_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_Missing_InputParameter_emailId, endPoint=/v1/partnermanager/partners/pms-111999/contact/add, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9903255448", "emailId": "$REMOVE$", "is_Active": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create contact details for the Partner while keeping the emailID parameter as missing, uniqueIdentifier=TC_PMS_AddContact_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CredPartnerApiKeyRequest_With_Invalid_policyName_useCaseDescription_neg, endPoint=/v1/partnermanager/partners/MOVP-AUTOMATION/policy/map, role=partner, templateFields=null, input={ "policyName": "mosip@8474748", "useCaseDescription": "mosi182736@636", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner API Key Request for Credential Partner with invalid Policy Name use case description, uniqueIdentifier=TC_PMS_RequestAPIKeyCredentialPartner_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CredPartnerApiKeyRequest_With_Invalid_useCaseDescription_neg, endPoint=/v1/partnermanager/partners/MOVP-AUTOMATION/policy/map, role=partner, templateFields=null, input={ "policyName": "mosip@8474748", "useCaseDescription": "mosip data share policy", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner API Key Request for Credential Partner with invalid use case description, uniqueIdentifier=TC_PMS_RequestAPIKeyCredentialPartner_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SubmitPartnerApiKeyRequest_Approval_All_for_Deactivated_policy, endPoint=/v1/partnermanager/partners/Tech-1233/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip data share policy ApiKey", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_016" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner API Key Request for Partner with Deactivated Policy, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SubmitPartnerApiKeyRequest_Map_partner_partner_inprogress_state_Neg, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_053" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner API Key Request for Partner and mapping the Partner with Inprogress Policy, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/MOVP-AUTOMATION/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip data share policy", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner API Key Request for Partner with valid data, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_ForDeactivateOIDCNeg_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy, uniqueIdentifier=TC_PMS_RequestAPIKeyForAuthPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_ForPending_All_Valid_sid, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip in progress mapping policy 19234", "useCaseDescription": "Need to submit for Pending", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_ForRejecting_All_Valid_sid, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip reject policy 19234", "useCaseDescription": "Need to submit for Rejecting", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/partnerPolicyMapping/partnerPolicyMappingResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_invalid_partnerId_neg, endPoint=/v1/partnermanager/partners/1hhggg9/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when invalid partnerId is given, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_invalid_policyName_neg, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "%^776hfgsdf", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when invalid policyname is given, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_missing_policyName_neg, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "$REMOVE$", "useCaseDescription": "Need to submit the payment", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when policyname is removed from request, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_partnerPolicyMapping_missing_useCaseDescription_neg, endPoint=/v1/partnermanager/partners/pms-111999/policy/map, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "useCaseDescription":"$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/partnerPolicyMapping/partnerPolicyMapping, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Mapping Partner & Policy when usecaseDescription is removed from request, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddBioExtractors_MosipDataSharePolicy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"MOVP-AUTOMATION", "policyId":"MDSP", "requesttime": "$TIMESTAMP$" }, output=null, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractorsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add BioExtractors for MOSIPDataSharePolicy for valid PolicyID, uniqueIdentifier=TC_PMS_addBioExtractors_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddBioExtractors_MosipPolicy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"pms-111999", "policyId":"$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output=null, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractorsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add BioExtractors for MOSIP Policy for valid PolicyID, uniqueIdentifier=TC_PMS_addBioExtractors_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddBioExtractors_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"abcd", "policyId":"MDSP", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add BioExtractors for invalid PartnerID, uniqueIdentifier=TC_PMS_addBioExtractors_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddBioExtractors_invalid_policyId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId":"MOVP-AUTOMATION", "policyId":"abcd", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/credentialPartner/AddBioExtractors/addBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Add BioExtractors for invalid PolicyID, uniqueIdentifier=TC_PMS_addBioExtractors_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingKey_Missing_InputParameter_status, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partner, templateFields=null, input={ "status": "$REMOVE$", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/authPartner/RejectMappingKey/RejectMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Approved Partner while keeping the Status parameter as missing, uniqueIdentifier=TC_PMS_RejectAPIKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_ForDeactivateOIDCNeg_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_ForDeactivateOIDCNeg_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=TC_PMS_ApproveAPIKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Map_partner_toalready_mapped_policy_neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PM_034" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Missing_Request_Time_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Missing_status_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "status": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_PastDate_Request_Time_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:partnerPolicyMapping_All_Valid_Smoke_sid_mappingkey$", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Reject_All_Valid, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Rejected", "mappingkey": "$ID:partnerPolicyMapping_ForRejecting_All_Valid_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping rejected successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_Rejected_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "mappingkey": "$ID:SubmitPartnerApiKeyRequest_Rejection_All_Valid_Smoke_sid_mappingkey$", "requesttime": "$TIMESTAMP$" }, output={ "response": "Policy mapping approved successfully" }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/ApproveMappingKey/approveMappingKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingKey_SpaceIn_mapping_key_Neg, endPoint=/v1/partnermanager/partners/policy/{mappingkey}, role=partneradmin, templateFields=null, input={ "status": "Approved", "requesttime": "$TIMESTAMP$", "mappingkey": " " }, output={ "errors": [ { "errorCode": "PMS_PMP_007" } ] }, inputTemplate=pms/ApproveMappingKey/approveMappingKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve the Mapping Key, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_invalid_auth, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies with invalid role, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRequestedPolicies_without_auth, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllRequestedPolicy/getAllRequestedPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the Requested Policies without login token, uniqueIdentifier=TC_PMS_GetAllRequestedPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&policyGroupAvailable=true&partnerType=Auth_Partner, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all Approved Auth Partner Policies, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_invalid_auth, endPoint=/v1/partnermanager/partners/auth-partners-policies, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all Approved Auth Partner Policies with invalid token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedAuthPartnerPolicy_without_auth, endPoint=/v1/partnermanager/partners/auth-partners-policies, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedAuthPartnerPolicy/getAllApprovedAuthPartnerPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all Approved Auth Partner Policies without token, uniqueIdentifier=TC_PMS_GetAllApprovedAuthPartnerPolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_BeforeApiKeyGenerated_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key Without Partner Register, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerBeforeApiKeyGenerated_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_AllValid_smoke_sid, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "pms-111999", "label": "string" }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/GenerateApiKey/generateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_InValid_policy_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "dfbgafb", "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_014", "message": "Policy does not exist" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generate Api Keys for Approved Policies with invalid policy, uniqueIdentifier=TC_PMS_GenerateApikey_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Missing_Request_time_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "String" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Missing_label_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 192341", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Missing_policyName_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_PastDate_Request_time_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "string", "requesttime": "1111-07-22T08:21:17.665Z" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKey_Regenerate_Same_Key_Neg, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy 19234", "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_110" } ] }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Generating an API Key, uniqueIdentifier=TC_PMS_GenerateApikey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid, endPoint=/v1/partnermanager/partners/pms-111999/generate/apikey, role=partnerauth, templateFields=null, input={ "policyName": "mosip policy", "label": "string", "requesttime": "$TIMESTAMP$" }, output={ "partnerId": "pms-111999", "label": "string" }, inputTemplate=pms/GenerateApiKey/generateApiKey, outputTemplate=pms/GenerateApiKey/generateApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_ActivateDeactivatePartnerApiKey_Lable_Removed_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "MDSP", "label": "$REMOVE$", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Activated PartnerAPIKey as Activate by Removing label, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_ActivateDeactivatePartnerApiKey_activate_Dublicate_Lable_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "MDSPK", "label": "string", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Activated PartnerAPIKey as Activate by Providing Duplicate label, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_ActivateDeactivatePartnerApiKey_invalid_label, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "MDSP", "label": "asdfsad", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid Label, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_activate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "label": "string", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ "response": "Partner apikey activated successfully." }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Activated PartnerAPIKey as Activate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_deactivate_InValid_APIKey_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "Tech-1233", "policyId": "policyid", "label": "string", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid APIKey, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_deactivate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "label": "string", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "response": "Partner apikey deactivated successfully." }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKeyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated PartnerAPIKey as Deactivate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "asdfgrwg", "policyId": "MDSP", "label": "string", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid PartnerId, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartnerApiKey_invalid_policyId, endPoint=/v1/partnermanager/partners/{partnerId}/policy/{policyId}/apiKey/status, role=partner, templateFields=null, input={ "partnerId": "partner-111997", "policyId": "asfv", "label": "string", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PRT_111" } ] }, inputTemplate=pms/ActivateDeactivatePartnerApiKey/activateDeactivatePartnerApiKey, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated PartnerAPIKey as Deactivate by Providing Invalid PolicyId, uniqueIdentifier=TC_PMS_ActivateDeactivatePartnerApiKey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_InsertDBData_For_API_Key_10_days, endPoint=no endpoint, role=partnerauth, templateFields=null, input={ "policy_id": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/InsertAPIKeyData10daysAPIKey, outputTemplate=pms/InsertDBData/InsertAPIKeyDataResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Inserting data in partner policy table for creation of API Key ID, uniqueIdentifier=TC_DBDependent_InsertQuery_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_InsertDBData_For_API_Key_15_days, endPoint=no endpoint, role=partnerauth, templateFields=null, input={ "policy_id": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/InsertAPIKeyData15daysAPIKey, outputTemplate=pms/InsertDBData/InsertAPIKeyDataResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Inserting data in partner policy table for creation of API Key ID, uniqueIdentifier=TC_DBDependent_InsertQuery_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_InsertDBData_For_API_Key_Valid_smoke_Pos, endPoint=no endpoint, role=partnerauth, templateFields=null, input={ "policy_id": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/InsertAPIKeyData, outputTemplate=pms/InsertDBData/InsertAPIKeyDataResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Inserting data in partner policy table for creation of API Key ID, uniqueIdentifier=TC_DBDependent_InsertQuery_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_invalid_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner with invalid token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_without_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner without token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_invalid_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner with invalid token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_without_auth, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartner/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key available for Auth Partner without token, uniqueIdentifier=TC_PMS_GetAllApikeyForAuthPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests, uniqueIdentifier=TC_PMS_partner-policy-requests_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_With_policyId_given, endPoint=/v1/partnermanager/partner-policy-requests?policyId={policyId}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "2", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for policyId which contains '2', uniqueIdentifier=TC_PMS_partner-policy-requests_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_combination_search_twofields, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}&requestDetails={requestDetails}, role=partnerauth, templateFields=null, input={ "partnerId": "1", "requestDetails": "2", "status": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving value for partnerId and requestDetails, uniqueIdentifier=TC_PMS_partner-policy-requests_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_orgname_given, endPoint=/v1/partnermanager/partner-policy-requests?orgName={orgName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "1", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for orgName which contains '1', uniqueIdentifier=TC_PMS_partner-policy-requests_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_pageNo_given, endPoint=/v1/partnermanager/partner-policy-requests?pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageNo": "8", "status": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageSize": "5", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving valid page number given, uniqueIdentifier=TC_PMS_partner-policy-requests_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_partnerId_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "a", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for PartnerId which contains 'a', uniqueIdentifier=TC_PMS_partner-policy-requests_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_partnerType_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerType={partnerType}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "a" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for partnerType which contains 'a', uniqueIdentifier=TC_PMS_partner-policy-requests_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_policygroupname_given, endPoint=/v1/partnermanager/partner-policy-requests?policyGroupName={policyGroupName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "Group", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for policyGroupName which contains 'Group', uniqueIdentifier=TC_PMS_partner-policy-requests_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_policyname_given, endPoint=/v1/partnermanager/partner-policy-requests?policyName={policyName}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "policy", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for policyName which contains 'policy', uniqueIdentifier=TC_PMS_partner-policy-requests_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_random_value_given, endPoint=/v1/partnermanager/partner-policy-requests?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "status": "$REMOVE$", "partnerId": "&&&abcdf", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving random value for partnerid, uniqueIdentifier=TC_PMS_partner-policy-requests_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_requestDetails_given, endPoint=/v1/partnermanager/partner-policy-requests?requestDetails={requestDetails}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "ab", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for requestDetails which contains 'ab', uniqueIdentifier=TC_PMS_partner-policy-requests_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_sortType_ASC, endPoint=/v1/partnermanager/partner-policy-requests?sortType={sortType}, role=partnerauth, templateFields=null, input={ "sortType": "ASC", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by sort type ASC for the given sort field, uniqueIdentifier=TC_PMS_partner-policy-requests_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_sortType_DESC, endPoint=/v1/partnermanager/partner-policy-requests?sortType={sortType}, role=partnerauth, templateFields=null, input={ "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "sortType": "DESC", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "status": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by sort type DESC for the given sort field, uniqueIdentifier=TC_PMS_partner-policy-requests_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_Inprogress, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "InProgress", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for which status as Inprogress, uniqueIdentifier=TC_PMS_partner-policy-requests_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_approved, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "approved", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output= { }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for which status as approved, uniqueIdentifier=TC_PMS_partner-policy-requests_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_with_status_rejected, endPoint=/v1/partnermanager/partner-policy-requests?status={status}, role=partnerauth, templateFields=null, input={ "status": "rejected", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests for which status as rejected, uniqueIdentifier=TC_PMS_partner-policy-requests_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_Invalid_Token_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests with invalid token, uniqueIdentifier=TC_PMS_partner-policy-requests_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_pageNo_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "pageNo": "-9", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving negative pageNo value, uniqueIdentifier=TC_PMS_partner-policy-requests_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_pageSize_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "pageSize": "-9", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by giving negative pagesize value, uniqueIdentifier=TC_PMS_partner-policy-requests_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "sortFieldName": "$%^%^&&^", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests with invalid sortfieldname, uniqueIdentifier=TC_PMS_partner-policy-requests_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_invalid_sortType_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=partnerauth, templateFields=null, input={ "sortType": "hdjfdfhg", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "requestDetails": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerType": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests by invalid sort type, uniqueIdentifier=TC_PMS_partner-policy-requests_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPartnerPolicyRequest_without_Authentication_Neg, endPoint=/v1/partnermanager/partner-policy-requests, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllPartnerPolicyRequest/getAllPartnerPolicyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the partner policy requests without authentication, uniqueIdentifier=TC_PMS_partner-policy-requests_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_All_Valid_Smoke, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partnered in the system, uniqueIdentifier=TC_PMS_GetListOfPartners_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_All_Valid_Smoke_admin_dashboard, endPoint=/v1/partnermanager/admin-partners, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partnered in the system, uniqueIdentifier=TC_PMS_GetListOfPartners_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_Filter_OrgName_SortType_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=orgName&sortType=ASC&pageNo=0&pageSize=8&orgName=partner, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by organization name and sorted in ascending order, uniqueIdentifier=TC_PMS_GetListOfPartners_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_Filter_isActive_type_true, endPoint=/v1/partnermanager/admin-partners?pageSize=8&isActive=true, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all the Active partners, uniqueIdentifier=TC_PMS_GetListOfPartners_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_Invalid_token_Neg, endPoint=/v1/partnermanager/admin-partners, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus, endPoint=/v1/partnermanager/admin-partners?certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by certificateUploadStatus, uniqueIdentifier=TC_PMS_GetListOfPartners_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=asc&certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by certificateUploadStatus in ascending order, uniqueIdentifier=TC_PMS_GetListOfPartners_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus_asc_without_sortFieldName_Neg, endPoint=/v1/partnermanager/admin-partners?sortType=asc&certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by certificateUploadStatus in ascending order and without sortFieldName, uniqueIdentifier=TC_PMS_GetListOfPartners_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_certificateUploadStatus_desc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=certificateUploadStatus&sortType=desc&certificateUploadStatus=uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by certificateUploadStatus in descending order, uniqueIdentifier=TC_PMS_GetListOfPartners_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_emailAddress_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by partnerid and sorted in ascending order, uniqueIdentifier=TC_PMS_GetListOfPartners_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_empty_pageno_Neg, endPoint=/v1/partnermanager/admin-partners?pageNo=111111, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_empty_partnerid_Neg, endPoint=/v1/partnermanager/admin-partners?partnerId=bcbcb, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_empty_partnertype_Neg, endPoint=/v1/partnermanager/admin-partners?partnerType=dfdgd, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_pageno_Neg, endPoint=/v1/partnermanager/admin-partners?pageNo=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_pagesize_Neg, endPoint=/v1/partnermanager/admin-partners?pageSize=-12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_partnerid_Neg, endPoint=/v1/partnermanager/admin-partners?partnerId=-dndn333, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_partnertype_Neg, endPoint=/v1/partnermanager/admin-partners?partnerType=2233ddd, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=-1&sortType=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by sortFieldName with invalid data, uniqueIdentifier=TC_PMS_GetListOfPartners_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_sortType_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered with invalid sortType, uniqueIdentifier=TC_PMS_GetListOfPartners_34 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_sortfield_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=a2a33, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_invalid_sorttype_Neg, endPoint=/v1/partnermanager/admin-partners?sortFieldName=a2a33, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_partnerType_Sort_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=asc&pageSize=8&partnerType=Auth, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by partnerType and sorted in ascending order, uniqueIdentifier=TC_PMS_GetListOfPartners_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_partnerType_Sort_desc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerType&sortType=desc&pageSize=8&partnerType=Auth, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by partnerType and sorted in descending order, uniqueIdentifier=TC_PMS_GetListOfPartners_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_partnerid_asc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by partnerid and sorted in ascending order, uniqueIdentifier=TC_PMS_GetListOfPartners_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_partnerid_desc, endPoint=/v1/partnermanager/admin-partners?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/GetListOfPartners/GetListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieving all partners filtered by partnerid and sorted in descending order, uniqueIdentifier=TC_PMS_GetListOfPartners_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_deactivated_partner_Neg, endPoint=/v1/partnermanager/admin-partners?isActive=false, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_emailAddress_Neg, endPoint=/v1/partnermanager/admin-partners?emailAddress=454646, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_organization_name_Neg, endPoint=/v1/partnermanager/admin-partners?orgName=123@1sse, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_policyGroup_Name_Neg, endPoint=/v1/partnermanager/admin-partners?policyGroupName=, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with empty policyGroup Name, uniqueIdentifier=TC_PMS_GetListOfPartners_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_empty_sort_Neg, endPoint=/v1/partnermanager/admin-partners?sortType=&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_email_Neg, endPoint=/v1/partnermanager/admin-partners?emailAddress=2t63t@@@, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_organization_name_Neg, endPoint=/v1/partnermanager/admin-partners?orgName=123@1sse, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_policyGroup_Name_Neg, endPoint=/v1/partnermanager/admin-partners?policyGroupName=-12, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_invalid_sort_Neg, endPoint=/v1/partnermanager/admin-partners?sortType=3@@#&pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPartners_with_not_uploaded_email_Neg, endPoint=/v1/partnermanager/admin-partners?certificateUploadStatus=not_uploaded, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfPartners/getListOfPartners, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Partner with invalid sort, uniqueIdentifier=TC_PMS_GetListOfPartners_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111777" }, output= { "partnerId": "pms-111777" }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_DevicePartner_All_Valid_Smoke, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111998" }, output= { "partnerId": "pms-111998" }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Device Partner Deatils, uniqueIdentifier=TC_PMS_GetPartnerDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_invalid_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=invalidtoken, templateFields=null, input={ "partnerId": "111777" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_admin_role_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "111777" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_invalid_partner_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "@334ds356" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_unauthor_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=resident, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_with_unauthorized_token_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=resident, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetDetailsOfPartner_without_admin_role_Neg, endPoint=/v1/partnermanager/admin-partners/{partnerId}, role=idrepo, templateFields=null, input={ "partnerId": " " }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetDetailsOfPartner/getDetailsOfPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the details of the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_All_Valid_Smoke, endPoint=/v1/policymanager/policies/v2, role=partneradmin, templateFields=null, input={ }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies in the system, uniqueIdentifier=TC_PMS_listofPolicies_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_invalid_token_neg, endPoint=/v1/policymanager/policies/v2, role=POLICYMANAGER, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies invalid token, uniqueIdentifier=TC_PMS_listofPolicies_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_combination_twoattributes_valid, endPoint=/v1/policymanager/policies/v2?policyId={policyId}&policyName={policyName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "1", "policyName": "1", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyName and policyid given, uniqueIdentifier=TC_PMS_listofPolicies_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_negative_pageNo_neg, endPoint=/v1/policymanager/policies/v2?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "-6", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageNo as '-6', uniqueIdentifier=TC_PMS_listofPolicies_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_negative_pageSize_neg, endPoint=/v1/policymanager/policies/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "-6", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageSize as '-6', uniqueIdentifier=TC_PMS_listofPolicies_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_pageNo_specified_valid, endPoint=/v1/policymanager/policies/v2?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "6", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageNo as '6', uniqueIdentifier=TC_PMS_listofPolicies_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_pagesize_specified_valid, endPoint=/v1/policymanager/policies/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "6", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with pageSize as '6', uniqueIdentifier=TC_PMS_listofPolicies_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyDescription_random_invalid_neg, endPoint=/v1/policymanager/policies/v2?policyDescription={policyDescription}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "3fdfds", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "0" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyDescription as '3fdfds', uniqueIdentifier=TC_PMS_listofPolicies_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyDescription_valid, endPoint=/v1/policymanager/policies/v2?policyDescription={policyDescription}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "a", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyDescription as 'a', uniqueIdentifier=TC_PMS_listofPolicies_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyGroupName_valid, endPoint=/v1/policymanager/policies/v2?policyGroupName={policyGroupName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "ab", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyGroupName as 'ab', uniqueIdentifier=TC_PMS_listofPolicies_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyId_valid, endPoint=/v1/policymanager/policies/v2?policyId={policyId}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "1", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyId as '1', uniqueIdentifier=TC_PMS_listofPolicies_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_policyName_valid, endPoint=/v1/policymanager/policies/v2?policyName={policyName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "a", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with policyName as 'a', uniqueIdentifier=TC_PMS_listofPolicies_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortFieldName_invalid_neg, endPoint=/v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "hfghfgdhf", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype, uniqueIdentifier=TC_PMS_listofPolicies_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortFieldName_valid, endPoint=/v1/policymanager/policies/v2?sortFieldName={sortFieldName}&sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "status", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortFieldName as 'status' as per given sorttype, uniqueIdentifier=TC_PMS_listofPolicies_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortType_asc, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "asc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortType as 'asc', uniqueIdentifier=TC_PMS_listofPolicies_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortType_desc, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "desc", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortType as 'desc', uniqueIdentifier=TC_PMS_listofPolicies_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_sortType_invalid_neg, endPoint=/v1/policymanager/policies/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "abdcfegff", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with sortType as 'abdcfegff', uniqueIdentifier=TC_PMS_listofPolicies_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_status_activated, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "activated" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with status as 'activated', uniqueIdentifier=TC_PMS_listofPolicies_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_status_deactivated, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "deactivated" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with status as 'deactivated', uniqueIdentifier=TC_PMS_listofPolicies_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_with_status_draft, endPoint=/v1/policymanager/policies/v2?status={status}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "policyType": "$REMOVE$", "policyId": "$REMOVE$", "policyName": "$REMOVE$", "policyDescription": "$REMOVE$", "policyGroupName": "$REMOVE$", "status": "draft" }, output= { "totalResults": "$IGNORE$" }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/GetListOfPolicies/getListOfPoliciesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies with status as 'draft', uniqueIdentifier=TC_PMS_listofPolicies_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_without_Authentication_neg, endPoint=/v1/policymanager/policies/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfPolicies/getListOfPolicies, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies without authentication, uniqueIdentifier=TC_PMS_listofPolicies_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfPolicies_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-policy-requests, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfPoliciesRequest/getListOfPoliciesRequest, outputTemplate=pms/GetListOfPoliciesRequest/getListOfPoliciesRequestResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active List Of Policies Request in the system, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_ForNeg_all_Valid_sid, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_RedirectUri_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$abcdefg", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_redirect_uri" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid redirectUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_auth_neg, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without token, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_granttypes_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "hghghgg", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "invalid_grant_type" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid granttypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_logoUri_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https//", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid logoUri, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_policyID_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89767", "policyId": "fgdggh", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid policyid, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_invalid_publickey_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": {}, "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client with invalid publickkey, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_without_granttypes_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "$REMOVE$", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without granttypes, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_without_name_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "$REMOVE$", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$JWKKEY$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without name field, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateOIDCClient_without_publickey_neg, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "name": "OIDC TEST CLIENT 89766", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "publicKey": "$REMOVE$", "authPartnerId": "pms-111999", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/OIDCClient/oIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Creating OAUTH Client without publickkey, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOauthClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOauthClient/getAllOauthClient, outputTemplate=pms/GetAllOauthClient/getAllOauthClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "ACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "ACTIVE" }, inputTemplate=pms/OIDCClient/oIDCClientUpdate, outputTemplate=pms/OIDCClient/oIDCClientResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_Invalid_Auth, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_without_Auth, endPoint=/v1/partnermanager/oauth/client, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_Requesttime_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientAuthMethods_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": $REMOVE$, "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}] }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientNameLangMap_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_clientName_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_client_id_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "client_id": " ", "requesttime": "$TIMESTAMP$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_grantTypes_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_ForNeg_all_Valid_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "grantTypes": $REMOVE$, "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_logoUri_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_redirectUris_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Missing_status_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_Retry_with_Deactivated_ClientId_Neg, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "errors": [ { "errorCode": "PMS_ESI_008" } ] }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateOIDCClient_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/oauth/client/{client_id}, role=partnerauth, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "client_id": "$ID:CreateOIDCClient_all_Valid_Smoke_sid_clientId$", "clientName": "OIDC TEST CLIENT 8976678", "status": "INACTIVE", "logoUri": "https://health-services.com/logo.png", "redirectUris": "$IDPREDIRECTURI$", "grantTypes": "authorization_code", "clientNameLangMap": [{"clientNameLang": "eng", "clientName": "new1112"}], "clientAuthMethods": "private_key_jwt" }, output={ "clientId": "$IGNORE$", "status": "INACTIVE" }, inputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClient, outputTemplate=pms/DeactivateOIDCClient/deactivateOIDCClientResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating The Oidc Client, uniqueIdentifier=TC_PMS_DeactivateOIDCClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllOidcClient_All_Valid_Smoke, endPoint=/v1/partnermanager/oauth/client, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetAllOidcClient/getAllOidcClient, outputTemplate=pms/GetAllOidcClient/getAllOidcClientResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all OIDC Clients of the loggedin Partner, uniqueIdentifier=TC_PMS_GetAllOidcClient_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_GetConfiguration_allValid_smoke, endPoint=/v1/partnermanager/system-config, role=partner, templateFields=null, input={ }, output={ "grantTypes": "authorization_code", "axiosTimeout": "3", "inActivityTimer": "25", "inActivityPromptTimer": "5", "clientAuthMethods": "private_key_jwt" }, inputTemplate=pms/GetConfiguration/GetConfiguration, outputTemplate=pms/GetConfiguration/GetConfigurationResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_before_consent_given, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "pms-111999" }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/GetUserConsent/GetUserConsentResultBeforeConsent, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent before consent is saved, uniqueIdentifier=TC_pms_GetUserConsent_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_AllValid_Smoke, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "pms-111999" }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/SaveUserConsent/SaveUserConsentResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=save User Consent, uniqueIdentifier=TC_PMS_saveUserConsent_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_invalid_roles_Neg, endPoint=/v1/partnermanager/users/user-consent, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=save User Consent when authentication is done with invalid roles, uniqueIdentifier=TC_PMS_saveUserConsent_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_invalid_user_Neg, endPoint=/v1/partnermanager/users/user-consent, role=regproc, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=save User Consent for invalid user, uniqueIdentifier=TC_PMS_saveUserConsent_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_saveUserConsent_without_authentication_Neg, endPoint=/v1/partnermanager/users/user-consent, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/SaveUserConsent/SaveUserConsent, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=save User Consent without authentication, uniqueIdentifier=TC_PMS_saveUserConsent_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_Get_consent_status_invalid_auth_token_neg, endPoint=/v1/partnermanager/users/user-consent, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve PMS GetUserConsent Status with an Invalid Auth Token, uniqueIdentifier=TC_pms_GetUserConsent_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_Get_consent_status_invalid_user_neg, endPoint=/v1/partnermanager/users/user-consent, role=regproc, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent Status for invalid User and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetUserConsent_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_Get_consent_status_without_access_token_neg, endPoint=/v1/partnermanager/users/user-consent, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent Status Without an Access Token and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetUserConsent_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetUserConsent_allValid_smoke, endPoint=/v1/partnermanager/users/user-consent, role=partnerauth, templateFields=null, input={ }, output={ "userId": "pms-111999" }, inputTemplate=pms/GetUserConsent/GetUserConsent, outputTemplate=pms/GetUserConsent/GetUserConsentResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetUserConsent for All Valid Smoke, uniqueIdentifier=TC_pms_GetUserConsent_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_DeviceProvider_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerftm, templateFields=null, input={ "partnerId": "pms-111888" }, output={ }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original ftm partner certificates, uniqueIdentifier=TC_PMS_getPartner_certificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerauth, templateFields=null, input={ "partnerId": "pms-111999" }, output={ }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates, uniqueIdentifier=TC_PMS_getPartner_certificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_invalid_roles_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partnerdevice, templateFields=null, input={ "partnerId": "pms-111999" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_007" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates when authenticated as device partner, uniqueIdentifier=TC_PMS_getPartner_certificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_random_partnerid_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partneradmin, templateFields=null, input={ "partnerId": "xyz12345abcdef" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates random value for partnerid, uniqueIdentifier=TC_PMS_getPartner_certificate_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_without_authentication_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111999" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates without authentication, uniqueIdentifier=TC_PMS_getPartner_certificate_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_without_partnerid_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/certificate-data, role=partneradmin, templateFields=null, input={ "partnerId": "" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/GetOriginalPartnerCertificates/GetOriginalPartnerCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get original Auth partner certificates without partnerid, uniqueIdentifier=TC_PMS_getPartner_certificate_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "misp@gmail.com", "organizationName": "misp", "partnerId": "MISP-AUTOMATION", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "MISP-AUTOMATION", "status": "InProgress" }, inputTemplate=pms/mispPartner/CreatePartner/createPartner, outputTemplate=pms/mispPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_MispLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "9553967572", "emailId": "mis2p@gmail.com", "organizationName": "misp2", "partnerId": "MISP2-AUTOMATION", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "MISP2-AUTOMATION", "status": "InProgress" }, inputTemplate=pms/mispPartner/CreatePartner/createPartner, outputTemplate=pms/mispPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration for Misp License, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerSelfRegistration_MispLicense_Msip_Smoke, endPoint=/v1/partnermanager/partners, role=partner, templateFields=null, input={ "address": "Bangalore", "contactNumber": "90110300", "emailId": "mis3p@gmail.com", "organizationName": "misp3", "partnerId": "MISP3", "partnerType": "MISP_Partner", "policyGroup": "mosip policy group", "requesttime": "$TIMESTAMP$" }, output= { "partnerId": "MISP3", "status": "InProgress" }, inputTemplate=pms/mispPartner/CreatePartner/createPartner, outputTemplate=pms/mispPartner/CreatePartner/createPartnerResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP Partner Self Registration for Misp License, uniqueIdentifier=TC_PMS_createPartnerSelfRegistration_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCertificate/uploadCertificate, outputTemplate=pms/mispPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid CA certificate for Misp Partner, uniqueIdentifier=TC_PMS_uploadCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadSUBCACertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/ca/upload, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCertificate/uploadSUBCACertificate, outputTemplate=pms/mispPartner/UploadCertificate/uploadCertificateResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid SUBCA certificate for Misp Partner, uniqueIdentifier=TC_PMS_uploadCert_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "partnerId": "MISP-AUTOMATION", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCert/uploadCert, outputTemplate=pms/mispPartner/UploadCert/uploadCertResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid certificate for Misp Partner, uniqueIdentifier=TC_PMS_UploadPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCert_MispLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "partnerId": "MISP2-AUTOMATION", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCert/uploadCert2, outputTemplate=pms/mispPartner/UploadCert/uploadCertResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid certificate for Misp License, uniqueIdentifier=TC_PMS_UploadPartnerCert_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCert_MispLicense_MISP3_Valid_Smoke, endPoint=/v1/partnermanager/partners/certificate/upload, role=partner, templateFields=null, input={ "partnerId": "MISP3", "requesttime": "$TIMESTAMP$" }, output= { }, inputTemplate=pms/mispPartner/UploadCert/uploadCert2, outputTemplate=pms/mispPartner/UploadCert/uploadCertResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload valid certificate for Misp License with valid PartnerID, uniqueIdentifier=TC_PMS_UploadPartnerCert_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartner_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MISP-AUTOMATION" }, output= { "partnerID": "MISP-AUTOMATION" }, inputTemplate=pms/mispPartner/GetPartner/getPartner, outputTemplate=pms/mispPartner/GetPartner/getPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Misp Partner details, uniqueIdentifier=TC_PMS_getPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartner_MISP3_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MISP3" }, output= { "partnerID": "MISP3" }, inputTemplate=pms/mispPartner/GetPartner/getPartner, outputTemplate=pms/mispPartner/GetPartner/getPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Misp Partner details with valid PartnerId, uniqueIdentifier=TC_PMS_getPartnerCert_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerCert_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/certificate, role=partner, templateFields=null, input={ "partnerId": "MISP-AUTOMATION" }, output= { }, inputTemplate=pms/mispPartner/GetCertificate/getCert, outputTemplate=pms/mispPartner/GetCertificate/getCertResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Misp Partner Certificate, uniqueIdentifier=TC_PMS_getPartnerCert_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ } }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details with valid details, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_AlreadyExists_Invalid, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_AUT_003" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping already exisits Model, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_DeviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Slab", "deviceTypeCode": "test", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_AUT_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping DeviceId as empty, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceProviderId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$REMOVE$", "deviceSubTypeCode": "Slab", "deviceTypeCode": "Finger", "id": "device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping DeviceProviderId as empty, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceSubTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "$REMOVE$", "deviceTypeCode": "Finger", "id": "device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping DeviceSubTypeCode as empty, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_Missing_InputParameter_deviceTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Slab", "deviceTypeCode": "$REMOVE$", "id": "device-id-123", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping DeviceTypeCode as empty, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_sameMakeModelType_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Single", "deviceTypeCode": "Finger", "id": "device-id-124", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping same Make Model Type with valid details, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_sameMakeModel_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Single", "deviceTypeCode": "Iris", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping same Make Model with valid details, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToSaveDeviceDetail_sameTypeSubType_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "pms-111998", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "$REMOVE$", "isItForRegistrationDevice": true, "make": "abcdef", "model": "FRO900000", "partnerOrganizationName": "PMS_API_ABC_ORG", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/create/createDeviceDetail, outputTemplate=pms/device/makeAndModel/create/createDeviceDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Save Device Details while keeping same Type SubType with valid details, uniqueIdentifier=TC_PMS_createServiceToSaveDeviceDetail_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectDeviceDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "device-id-123", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/device/makeAndModel/approve/approveDeviceDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject Device Details with valid details, uniqueIdentifier=TC_PMS_rejectDeviceDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectDeviceDetail_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "device-id-123", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject Device Details while keeping approvalStatus as empty, uniqueIdentifier=TC_PMS_rejectDeviceDetail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectDeviceDetail_Missing_InputParameter_deviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$REMOVE$", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject Device Details while keeping deviceId as empty, uniqueIdentifier=TC_PMS_rejectDeviceDetail_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectDeviceDetail_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "device-id-124", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/device/makeAndModel/approve/approveDeviceDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject Device Details with valid details, uniqueIdentifier=TC_PMS_rejectDeviceDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveRejectDeviceDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "device-id-123", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/device/makeAndModel/approve/approveDeviceDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device details for Approved Partner as Activate, uniqueIdentifier=TC_PMS_createApproveRejectDeviceDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveRejectDeviceDetail_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "device-id-123", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device details for Approved Partner while keeping approvalStatus as empty, uniqueIdentifier=TC_PMS_createApproveRejectDeviceDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveRejectDeviceDetail_Missing_InputParameter_deviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$REMOVE$", "isItForRegistrationDevice": "true", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/approve/approveDeviceDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device details for Approved Partner as Activate while keeping deviceId as empty, uniqueIdentifier=TC_PMS_createApproveRejectDeviceDetail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Slap", "deviceTypeCode": "Finger", "id": "device-id-123", "isActive": true, "isItForRegistrationDevice": true, "make": "abcdef", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/device/makeAndModel/update/updateDeviceDetailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail with valid details, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_DeviceId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Slab", "deviceTypeCode": "Finger", "id": "$REMOVE$", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail while keeping DeviceId as empty, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceProviderId, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "$REMOVE$", "deviceSubTypeCode": "Slab", "deviceTypeCode": "Finger", "id": "device-id-123", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_AUT_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail while keeping DeviceProvideId as empty, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceSubTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "$REMOVE$", "deviceTypeCode": "Finger", "id": "device-id-123", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail while keeping DeviceSubTypeCode as empty, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_Missing_InputParameter_deviceTypeCode, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Slab", "deviceTypeCode": "$REMOVE$", "id": "device-id-123", "isActive": true, "isItForRegistrationDevice": true, "make": "abcde", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail while keeping DeviceTypeCode as empty, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToUpdateDeviceDetail_afterReject_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partner, templateFields=null, input={ "deviceProviderId": "Tech-123", "deviceSubTypeCode": "Single", "deviceTypeCode": "Finger", "id": "device-id-124", "isActive": true, "isItForRegistrationDevice": true, "make": "abcdef", "model": "FRO90000", "partnerOrganizationName": "Techno", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/makeAndModel/update/updateDeviceDetail, outputTemplate=pms/device/makeAndModel/update/updateDeviceDetailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Service To Update DeviceDetail afterReject, uniqueIdentifier=TC_PMS_createServiceToUpdateDeviceDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asff", "type": "all", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "all", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "asdf", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_To_MapSBI, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "device-id-321" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter to MapSBI, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter with valid values, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceDetailsFilter_all_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "all", "text": "device-id-123" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "fieldID": "id", "fieldCode": "device-id-123" }, inputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilter, outputTemplate=pms/FilterAPIs/DeviceDetailsFilter/deviceDetailsFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Details Filter with valid values, uniqueIdentifier=TC_PMS_DeviceDetailsFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_AllValid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type with all valid details, uniqueIdentifier=TC_PMS_createSearchDeviceType_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "t" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceType_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceType_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_Smoke_sid, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "t" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type, uniqueIdentifier=TC_PMS_createSearchDeviceType_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType__Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "active": "true" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceType_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_invalid_sort_field, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "mo@@@del", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping sortField parameter as invalid, uniqueIdentifier=TC_PMS_createSearchDeviceType_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_invalid_sort_type, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "dc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping sortType parameter as invalid, uniqueIdentifier=TC_PMS_createSearchDeviceType_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_missing_columnName, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-311" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping columnName parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceType_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_missing_sort_field, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping sortField parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceType_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_missing_sort_type, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Touchless" } ], "sort": [ { "sortField": "code", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping sortType parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceType_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceType_with_missing_type, endPoint=/v1/partnermanager/devicedetail/deviceType/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "$REMOVE$", "value": "Touchless" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceType/createSearchDeviceType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Type while keeping Type parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceType_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_AllValid_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details with all valid data, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "id", "type": "equals", "value": "device-id-123" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_sort_type_desc_equals_Smoke_sid, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "id", "type": "equals", "value": "device-id-123" } ], "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while Type parameter as Equals and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_invalid_columnName, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "mo@@@@@@@2334412345del", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310", "message": "Invalid column received : mo@@@@@@@2334412345del" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details with invalid columnName, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_invalid_sort_field, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "mo@@@del", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357", "message": "Invalid sort field mo@@@del" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while keeping sortField parameter as invalid, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_invalid_sort_type, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "dc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358", "message": "Sort type dc is not supported" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while keeping sortType parameter as invalid, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_missing_sort_field, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "$REMOVE$", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314", "message": "Missing sort field or sort type values" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while keeping sortField parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_missing_sort_type, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "startswith", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314", "message": "Missing sort field or sort type values" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while keeping sortType parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchDeviceDetails_with_missing_type, endPoint=/v1/partnermanager/devicedetail/search, role=partner, templateFields=null, input={ "deviceProviderId": "all", "filters": [ { "columnName": "model", "type": "$REMOVE$", "value": "FACE01" } ], "sort": [ { "sortField": "model", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312", "message": "Filter type is missing" } ] }, inputTemplate=pms/SearchAPIs/SearchDeviceDetails/createSearchDeviceDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Device Details while keeping Type parameter as empty, uniqueIdentifier=TC_PMS_createSearchDeviceDetails_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBIBeforeAddingSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ }, output= { "pageNo": "0" }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIBeforAddingSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI, uniqueIdentifier=TC_PMS_SBI_List_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ "swBinaryHash": "devicehaadsassh", "swVersion": "deviceswasdasd", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_Missing_partnerId_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2222-12-30T08:23:57.986Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface while keeping parameter PartnerId as empty, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_Missing_swVersion_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2222-12-30T08:23:57.986Z", "swVersion": "$REMOVE$", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface while keeping parameter swVersion as empty, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_SpaceVal_partnerId_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "pms- 111998" }, output={ "errors": [ { "errorCode": "PMS_AUT_002" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface while keeping parameter SpaceVal as empty, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_TO_Map_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.04", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface To Map sId, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_Valid_ForDeactivate_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.05", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface with valid details, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_Valid_Smoke_ForReject_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.03", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface with valid details, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.02", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDtoResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface with valid details, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveSecureBiometricInterface_dublicate_swVersion_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "swBinaryHash": "0", "swCreateDateTime": "$TIMESTAMP$", "swExpiryDateTime": "2033-08-22T12:51:07.794Z", "swVersion": "MO.TD.01", "requesttime": "$TIMESTAMP$", "providerId": "pms-111998" }, output={ "errors": [ { "errorCode": "PMS_AUT_512" } ] }, inputTemplate=pms/SaveSecureBiometricInterfaceCreateDto/SaveSecureBiometricInterfaceCreateDto, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create SaveSecureBiometricInterface with duplicate swVersion, uniqueIdentifier=TC_PMS_createSaveSecureBiometricInterface_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectSecureBiometricInterface_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_ForReject_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject SecureBiometricInterface with valid detais, uniqueIdentifier=TC_PMS_RejectSecureBiometricInterface_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectSecureBiometricInterface_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterface, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject SecureBiometricInterface while keeping parameter approvalStatus as Empty, uniqueIdentifier=TC_PMS_RejectSecureBiometricInterface_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectSecureBiometricInterface_SpaVal_neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "De-activate", "id": "a0f2b0ca-92 66-4cf4-832c-7741d5b6a174", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/SecureBiometricInterface/reject/rejectSecureBiometricInterface, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject SecureBiometricInterface with SpaVal invalid, uniqueIdentifier=TC_PMS_RejectSecureBiometricInterface_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveSecureBiometricInterface_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approvr Secure Biometric Interface with valid details, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveSecureBiometricInterface_Missing_InputParameter_approvalStatus, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "$REMOVE$", "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approvr Secure Biometric Interface while keeping parameter approval status as empty, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveSecureBiometricInterface_ToMap_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$ID:SaveSecureBiometricInterface_TO_Map_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approvr Secure Biometric Interface with valid details, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveSecureBiometricInterface_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "approvalStatus": "Activate", "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterface, outputTemplate=pms/device/SecureBiometricInterface/approve/approveSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approvr Secure Biometric Interface with valid details, uniqueIdentifier=TC_PMS_ApproveSecureBiometricInterface_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateSecureBiometricInterface_AfterReject_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_ForReject_sid_id$", "approvalStatus": "Activate" }, output={ "errors": [ { "errorCode": "PMS_AUT_518" } ] }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create UpdateSecureBiometricInterface AfterRejectwith valid details, uniqueIdentifier=TC_PMS_createUpdateSecureBiometricInterface_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateSecureBiometricInterface_DeviceProvider_AllValid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "approvalStatus": "Activate" }, output={ "response": "Secure biometric details approved successfully." }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterfaceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=null, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateSecureBiometricInterface_Missing_InputParameter_Id, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "id": "$REMOVE$", "approvalStatus": "Activate" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create UpdateSecureBiometricInterface while keeping parameter ID as empty, uniqueIdentifier=TC_PMS_createUpdateSecureBiometricInterface_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateSecureBiometricInterface_ReApprove_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partner, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "approvalStatus": "Activate" }, output={ "errors": [ { "errorCode": "PMS_AUT_517" } ] }, inputTemplate=pms/UpdateSecureBiometricInterface/UpdateSecureBiometricInterface, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create UpdateSecureBiometricInterface AfterRejectwith valid details, uniqueIdentifier=TC_PMS_createUpdateSecureBiometricInterface_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchSecureBiometric_AllValid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Secure Biometric with valid details, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchSecureBiometric_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "providerId", "type": "equals", "value": "Tech-123" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Secure Biometric with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchSecureBiometric_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Secure Biometric with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchSecureBiometric_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "swCreateDateTime", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Secure Biometric with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchSecureBiometric_type_contains_Smoke_asc_sid, endPoint=/v1/partnermanager/securebiometricinterface/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "providerId", "type": "equals", "value": "Tech-123" } ], "sort": [ { "sortField": "swCreateDateTime", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometric, outputTemplate=pms/SearchAPIs/SearchSecureBiometric/createSearchSecureBiometricResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Secure Biometric while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchSecureBiometric_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_allValid_smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=partnerdevice, templateFields=null, input={ }, output={ "partnerId": "pms-111998" }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIdsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Approved Device ProviderId, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviders_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Approved Device ProviderIds with invalid access token, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_Without_Authentication_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Approved Device ProviderIds Without Authentication, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_with_Admin_roles_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=device, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Device ProviderIds with Admin roles, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApprovedDeviceProviderIds_without_partner_roles_Neg, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=Device_Provider, role=device, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApprovedDeviceProviderIds/GetAllApprovedDeviceProviderIds, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Approved Device ProviderIds without_partner_roles, uniqueIdentifier=TC_PMS_GetAllApprovedDeviceProviderIds_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_UpdateSBIID_10_days_Valid_smoke_Pos, endPoint=no endpoint, role=partnerdevice, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/UpdateSBIID10daysSBIExpiry, outputTemplate=pms/InsertDBData/UpdateSBIIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating SBI ID in SBI table for 10 days Expiry, uniqueIdentifier=TC_UpdateSBID_InsertQuery_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_UpdateSBIID_15_days_Valid_smoke_Pos, endPoint=no endpoint, role=partnerdevice, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/UpdateSBIID15daysSBIExpiry, outputTemplate=pms/InsertDBData/UpdateSBIIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating SBI ID in SBI table for 15 days Expiry, uniqueIdentifier=TC_UpdateSBID_InsertQuery_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_UpdateSBIID_30_days_Valid_smoke_Pos, endPoint=no endpoint, role=partnerdevice, templateFields=null, input={ "id": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/InsertDBData/UpdateSBIID, outputTemplate=pms/InsertDBData/UpdateSBIIDResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Updating SBI ID in SBI table for 30 days Expiry, uniqueIdentifier=TC_UpdateSBID_InsertQuery_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/GetSbiDetailsList/GetAllSbiDetailsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve the PMS GetSbiDetails List for All Valid Inputs, uniqueIdentifier=TC_pms_GetSbiDetailsList_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_partners_sbi_detail_API_with_Admin_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=regproc, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner SBI Details with Admin Role and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_response_Auth_Partner_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerauth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Response With Authentication Partner Role and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_response_ftm_Partner_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Response With Authentication Partner Role and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_response_without_Partner_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=ftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Response Without Partner Role and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetSbiDetailsList_get_response_without_authorization_token_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetSbiDetailsList/GetSbiDetailsList, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve responce without authorization taken and Expecting an Error in The Response, uniqueIdentifier=TC_pms_GetSbiDetailsList_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceTypeFilter_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "all", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "code", "fieldValue": "Finger", "fieldCode": "Finger" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Type Filter for Partner with valid values, uniqueIdentifier=TC_PMS_DeviceTypeFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceTypeFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asdf", "type": "unique", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Type Filter for Partner while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_DeviceTypeFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceTypeFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Type Filter for Partner while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_DeviceTypeFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceTypeFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Type Filter for Partner while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_DeviceTypeFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceTypeFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "asdf", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/DeviceTypeFilter/DeviceTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Device Type Filter for Partner while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_DeviceTypeFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partnerdevice, templateFields=null, input={ "filters": [{ "columnName": "deviceType", "type": "unique", "text": "Finger" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "deviceType", "fieldValue": "Finger", "fieldCode": "Single" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Device SubType Filter, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_ColumnCode_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "all", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create DeviceSubType Filter with valid values, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asdf", "type": "all", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create DeviceSubType Filter while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "all", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create DeviceSubType Filter while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create DeviceSubType Filter while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeviceSubTypeFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/devicedetail/deviceSubType/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "code", "type": "asfdg", "text": "Single" }], "purpose": "REGISTRATION", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/DeviceSubTypeFilter/DeviceSubTypeFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create DeviceSubType Filter while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_DeviceSubTypeFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998", "make": "AcmeCorpDeactivate", "model": "X1000Deactivate", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Save Device Details, uniqueIdentifier=TC_PMS_SaveDeviceDetails_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveDeviceDetails_DeviceProviderForPendingApproval_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998", "make": "AcmeCorpApprovalPending", "model": "X1000ApprovalPending", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Save Device Details, uniqueIdentifier=TC_PMS_SaveDeviceDetails_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998", "make": "AcmeCorpReject", "model": "X1000Reject", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Save Device Details, uniqueIdentifier=TC_PMS_SaveDeviceDetails_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998", "make": "AcmeCorp", "model": "X1000", "requestTime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/SaveDeviceDetails/SaveDeviceDetails, outputTemplate=pms/SaveDeviceDetails/SaveDeviceDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Save Device Details, uniqueIdentifier=TC_PMS_SaveDeviceDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI, uniqueIdentifier=TC_PMS_SBI_List_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Filter_Expiry_Period_10_days, endPoint=/v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}, role=partnerdevice, templateFields=null, input={ "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "10" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI details filter by Expiry period 10 days, uniqueIdentifier=TC_PMS_SBI_List_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Filter_Expiry_Period_15_days, endPoint=/v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}, role=partnerdevice, templateFields=null, input={ "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "15" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI details filter by Expiry period 15 days, uniqueIdentifier=TC_PMS_SBI_List_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Filter_Expiry_Period_30_days, endPoint=/v1/partnermanager/securebiometricinterface?expiryPeriod={expiryPeriod}, role=partnerdevice, templateFields=null, input={ "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "30" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI details filter by Expiry period 30 days, uniqueIdentifier=TC_PMS_SBI_List_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Partner_device_token, endPoint=/v1/partnermanager/securebiometricinterface, role=partnerdevice, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI details with Parter device token, uniqueIdentifier=TC_PMS_SBI_List_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_orgName_valid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "orgName": "1", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with orgName contains '1', uniqueIdentifier=TC_PMS_SBI_List_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_pagesize_given_valid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "pageSize": "12", "sbiVersion": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with pageSize specified, uniqueIdentifier=TC_PMS_SBI_List_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_partnerId_valid_sid, endPoint=/v1/partnermanager/securebiometricinterface?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "a", "orgName": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with partnerId contains 'a', uniqueIdentifier=TC_PMS_SBI_List_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_random_value_given_sid, endPoint=/v1/partnermanager/securebiometricinterface, role=partneradmin, templateFields=null, input={ "partnerId": "^&&%%%", "orgName": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with random value for partnerId, uniqueIdentifier=TC_PMS_SBI_List_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sbiExpiryStatus_expired, endPoint=/v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "expired", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiExpiryStatus as expired, uniqueIdentifier=TC_PMS_SBI_List_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sbiExpiryStatus_valid, endPoint=/v1/partnermanager/securebiometricinterface?sbiExpiryStatus={sbiExpiryStatus}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "valid", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiExpiryStatus as vaild, uniqueIdentifier=TC_PMS_SBI_List_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sbiVersion_given, endPoint=/v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiId": "$REMOVE$", "sbiVersion": "abcd", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiVersion, uniqueIdentifier=TC_PMS_SBI_List_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sortType_ASC, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "sortType": "ASC", "pageNo": "0", "pageSize": "5", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with ASC, uniqueIdentifier=TC_PMS_SBI_List_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_sortType_DESC, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}&sortFieldName={sortFieldName}&pageNo={pageNo}&pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "sbiExpiryStatus": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "sortType": "DESC", "pageNo": "0", "pageSize": "5", "sbiId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "policyId": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with sbiVersion, uniqueIdentifier=TC_PMS_SBI_List_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_approved_sid, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as approved, uniqueIdentifier=TC_PMS_SBI_List_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_deactivated, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as deactivated, uniqueIdentifier=TC_PMS_SBI_List_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_pending_approval_sid, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as pending_approval, uniqueIdentifier=TC_PMS_SBI_List_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_status_rejected, endPoint=/v1/partnermanager/securebiometricinterface?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBIResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with status as rejected, uniqueIdentifier=TC_PMS_SBI_List_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "all" }], "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping Type parameter as All, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_InValid_Column_doesnt_exist, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "asrfg", "type": "all" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_InValid_Empty_column, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "", "type": "all" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001", "message": "Invalid request parameter - must not be blank :request.filters[0].columnName" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_InValid_Empty_type, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322", "message": "Filter Type cannot be empty or null" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_InValid_type_doesnt_exist, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "asdfg" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324", "message": "Received Filter Type not supported" } ] }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ServiceToFilterSBI_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "text": "Tech-123", "columnName": "providerId", "type": "unique" }], "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBI, outputTemplate=pms/FilterAPIs/ServiceToFilterSBI/serviceToFilterSBIResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ServiceToFilterSBI for Partner while keeping Type parameter as Unique, uniqueIdentifier=TC_PMS_ServiceToFilterSBI_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapDeviceWithSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "device-id-123", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=MapDeviceWithSBI with valid details, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapDeviceWithSBI_Multiple_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "device-id-123", "sbiId": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=MapDevice Partner With Multiple SBI valid details, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapDeviceWithSBI_Multiple_MapDeviceWith_Diff_Provider, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "MOSIP.PROXY.SBI", "sbiId": "$ID:SaveSecureBiometricInterface_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_AUT_005" } ] }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=MapDevice Partner With Multiple SBI with different Provider, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapDeviceWithSBI_Multiple_map, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map, role=partner, templateFields=null, input={ "deviceDetailId": "device-id-123", "sbiId": "$ID:SaveSecureBiometricInterface_TO_Map_Smoke_sid_id$" }, output={ }, inputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/MapDeviceWithSBI/mapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=MapDevice Partner With Multiple SBI, uniqueIdentifier=TC_PMS_MapDeviceWithSBI_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RemoveMapDeviceWithSBI_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/securebiometricinterface/devicedetails/map/remove, role=partner, templateFields=null, input={ "deviceDetailId": "device-id-123", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ "response": "Success" }, inputTemplate=pms/device/SecureBiometricInterface/RemoveMapDeviceWithSBI/removeMapDeviceWithSBI, outputTemplate=pms/device/SecureBiometricInterface/RemoveMapDeviceWithSBI/removeMapDeviceWithSBIResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Remove Partner Mapped Device with SBI, uniqueIdentifier=TC_PMS_RemoveMapDeviceWithSBI_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output= { }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve Mapping Device To Sbi, uniqueIdentifier=TC_PMS_ApproveMappingDevice_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_ForDeactivate_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid_id$" }, output= { }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve Mapping Device To Sbi, uniqueIdentifier=TC_PMS_ApproveMappingDevice_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_different_deviceDetails_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "34242" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi with different deviceDetails, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_which_is_already_approved_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi by providing parameters which are already approved, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_DeviceID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$7372882$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi by providing invalid Device ID, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_Partner_Authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi with Invalid Partner Authentication, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_Invalid_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "84838772", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi by providing invalid SBI ID, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_missing_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$REMOVE$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_024" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi while keeping SBI ID parameter as missing, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_with_random_DeviceProviderID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "deivce-sunny", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi with randome Device provider Id, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Partner_Authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Partner Authentication, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Req_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Request ID, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$REMOVE$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without requestTime, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without without sbiId value, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_Version_value_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Version value, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_without_deviceProviderID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve mapping device to sbi without Device provider Id, uniqueIdentifier=TC_PMS_ApproveMappingDeviceToSbiNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output= { }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbi, outputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject Mapping Device To Sbi, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbi_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_whichisRejected_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi by providing SBI which is Rejected and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbi_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSb_ReqID_Null_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "null", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping ReqID parameter as Null in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": " " }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping device ID as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Empty Partner ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_RequestTimeString_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": " ", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping RequestTime parameter as Empty string in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping RequestTime parameter as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Empty SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Empty_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": " ", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "7281818", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Invalid SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as invalid value 0 in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as invalid value 1 in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Invalid_VersionValues_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "7288283", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as invalid values in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Missing_Req_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while passing Invalid RequestID parameter in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Missing_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as Missing in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Null_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "null", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping Version parameter as Null in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_Provide_different_SBIID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:GetListOfAllSBI_partnerId_valid_sid_sbiId$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with different SBI ID and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_ReqID_Empty_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping ReqID parameter as Empty in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_ReqID_Invalid_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "7472828", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping ReqID parameter as Invalid in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_already_Rejected_mapped_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while providing already rejeceted device ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_different_format_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "1111-07-22T08:21:17.665Z", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping RequestTime value other than given format in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "812293" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while providing invalid device ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Device_IDvalues_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "8228828" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping device ID values in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "100223111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping invalid Partner ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_invalid_object_paramter_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "jadhav", "sbiId": "9329", "deviceDetailId": "93130" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with invalid object paramter in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_null_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "null" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping device ID as null in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_null_Partner_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "null", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_002" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping null Partner ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_null_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "null", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping null SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_random_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "731811993", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping random SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_with_Partner_Roles_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=device, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with Parter roles and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_with_different_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "233313" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi with different device ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_without_Partner_Auth_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.reject.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi without Partner Authentication and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_without_RequestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$REMOVE$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi without RequestTime parameter in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_RejectMappingDeviceToSbi_without_SBI_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.approval.mapping.device.to.sbi.post", "version": "1.0", "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProviderForReject_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/RejectMappingDeviceToSbi/RejectMappingDeviceToSbiNegativeScenarios, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject mapping device to sbi while keeping without SBI ID in request and expecting an error in response, uniqueIdentifier=TC_PMS_RejectMappingDeviceToSbiNegativeScenarios_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_whichisRejected_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_010" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve Mapping Device To Sbi when SBI is Rejected, uniqueIdentifier=TC_PMS_ApproveMappingDevice_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_All_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output= { "deviceTypeCode": "Face", "deviceSubTypeCode": "Full face", "deviceProviderId": "pms-111998" }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbiResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Device List Mapped With Sbi, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedwithSbi_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "AJDJD9281" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all Device list which are mapped with SBI by provinding invalid SBI id in request, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_when_SBI_not_authenticated_device_provider_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=partnerdevice, templateFields=null, input={ "sbiId": "$ID:GetListOfAllSBI_partnerId_valid_sid_sbiId$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_019" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all Device list when SBI given is different from the authentiacted device provider, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllDeviceListMappedWithSbi_without_authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}/devices, role=invalidtoken, templateFields=null, input={ "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllDeviceListMappedWithSbi/GetAllDeviceListMappedWithSbi, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all Device list which are mapped with SBI without Authentication, uniqueIdentifier=TC_PMS_GetAllDeviceListMappedWithSbiNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBI_PendingForApproval_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_Valid_ForDeactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_022" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI which is pending for approval, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnersPolicy_allValid_smoke, endPoint=/v1/policymanager/policies/{policyId}/partner/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "policyId": "mpolicy-default-auth", "requesttime": "$TIMESTAMP$" }, output={ "policyGroupId": "mpolicygroup-default-auth", "policyGroupName": "mpolicygroup-default-auth", "policyId": "$IGNORE$", "policyName": "$IGNORE$", "status": "PUBLISHED" }, inputTemplate=pms/GetPartnersPolicy/getPartnersPolicy, outputTemplate=pms/GetPartnersPolicy/getPartnersPolicyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy details, uniqueIdentifier=TC_PMS_GetPartnersPolicy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnersPolicy_invalid_partnerId, endPoint=/v1/policymanager/policies/{policyId}/partner/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "abcd", "policyId": "mpolicy-default-auth", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_POL_017" } ] }, inputTemplate=pms/GetPartnersPolicy/getPartnersPolicy, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partners Policy details while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_GetPartnersPolicy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllPolicyGroup_allValid_smoke, endPoint=/v1/policymanager/policies/group/all, role=partner, templateFields=null, input={ "requesttime": "$TIMESTAMP$" }, output={ } , inputTemplate=pms/GetAllPolicyGroup/getAllPolicyGroup, outputTemplate=pms/GetAllPolicyGroup/getAllPolicyGroupResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve All Partner Policy Group, uniqueIdentifier=TC_PMS_GetAllPolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_AllValid_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group with all valid details, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_Only_FilterCriteria_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Auth" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_Only_PaginationCriteria_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_Only_SortCriteria_Smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_columnname_id_asc_smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "contains", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "id", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping columnName parameter as id and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_columnname_id_desc_smoke, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "contains", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping columnName parameter as id and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_contains_Smoke_asc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_contains_Smoke_desc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "contains", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as contains and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_equals_Smoke_asc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "isActive": true }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as equals and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_equals_Smoke_desc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "equals", "value": "mpolicygroup-default-auth" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as equals and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_startswith_Smoke_asc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as startswith and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_type_startswith_Smoke_desc_sid, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "name", "type": "startswith", "value": "Auth" } ], "sort": [ { "sortField": "name", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroupResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping Type parameter as startswith and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPolicyGroup_with_missing_columnName, endPoint=/v1/policymanager/policies/group/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "startswith", "value": "Data Share" } ], "sort": [ { "sortField": "descr", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-311" } ] }, inputTemplate=pms/SearchAPIs/SearchPolicyGroup/createSearchPolicyGroup, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Policy Group while keeping columnName parameter as empty, uniqueIdentifier=TC_PMS_createSearchPolicyGroup_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_Invalid_Column_doesnt_exist, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "sfg", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_PolicyGroupFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_Invalid_EmptyColumnName, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping ColumnName parameter as Empty, uniqueIdentifier=TC_PMS_PolicyGroupFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_Invalid_EmptyFilterType, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_PolicyGroupFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_Invalid_Type_doesnt_exist, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "sfgar", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_003", "message": "Could not process the request" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_PolicyGroupFilter_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_all_Valid_Smoke, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "name", "fieldValue": "mpolicygroup-default-auth", "fieldCode": "mpolicygroup-default-auth" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner with valid values, uniqueIdentifier=TC_PMS_PolicyGroupFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_using_name_Valid_Smoke, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "unique", "text": "update_policy_group" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "name", "fieldValue": "update_policy_group", "fieldCode": "update_policy_group" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner using valid name, uniqueIdentifier=TC_PMS_PolicyGroupFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PolicyGroupFilter_using_name_with_columnname_Valid_Smoke, endPoint=/v1/policymanager/policies/group/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "name", "type": "all", "text": "mpolicygroup-default-auth" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "name", "fieldValue": "mpolicygroup-default-auth", "fieldCode": "mpolicygroup-default-auth" } ] }, inputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilter, outputTemplate=pms/FilterAPIs/PolicyGroupFilter/policyGroupFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Policy Group Filter for Partner while keeping valid name for coulmnname parameter, uniqueIdentifier=TC_PMS_PolicyGroupFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetValueForConfigKey_allValid_smoke, endPoint=/v1/policymanager/policies/config/{key}, role=partner, templateFields=null, input={ "key": "abcd", "requesttime": "$TIMESTAMP$" }, output={ "key": "abcd", } , inputTemplate=pms/GetValueForConfigKey/getValueForConfigKey, outputTemplate=pms/GetValueForConfigKey/getValueForConfigKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve valid Value For Config Key keeping invalid Key, uniqueIdentifier=TC_PMS_GetValueForConfigKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asfgs", "type": "unique", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_PartnerFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_PartnerFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_Invalid_Empty_column, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_PartnerFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "asdg", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_PartnerFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_all_Valid_Smoke, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "all", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner-default-abis", "fieldCode": "mpartner-default-abis" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping Type parameter as All, uniqueIdentifier=TC_PMS_PartnerFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerFilter_unique_Valid_Smoke, endPoint=/v1/partnermanager/partners/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "mpartner-default-abis" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner-default-abis", "fieldCode": "mpartner-default-abis" } ] }, inputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilter, outputTemplate=pms/FilterAPIs/PartnerFilter/partnerFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Partner Filter while keeping Type parameter as Unique, uniqueIdentifier=TC_PMS_PartnerFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_AllValid_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key with valid data, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "unique", "value": "mpolicy_part_auth_api" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key with Only FilterCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_Only_Pagination_Criteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key with Only PaginationCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "isActive", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key with Only SortCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_type_contains_Smoke_asc_sid, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "unique", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "isActive", "sortType": "asc" } ], "pageFetch": "1", "pageStart": "0", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_columnName, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "abcd", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "policyApiKey", "sortType": "asc" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key while keeping Type parameter as contains and invalid columnName, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_pagination, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "policyApiKey", "sortType": "asc" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key while keeping Type parameter as contains and invalid pagination, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_sortField, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "abcd", "sortType": "asc" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key while keeping Type parameter as contains and invalid sortField, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiKey_type_contains_invalid_sortType, endPoint=/v1/partnermanager/partners/apikey/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "policyApiKey", "type": "contains", "value": "mpolicy_part_auth_api" } ], "sort": [ { "sortField": "policyApiKey", "sortType": "abcd" } ], "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiKey/searchPartnerApiKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Key while keeping Type parameter as contains and invalid sortType, uniqueIdentifier=TC_PMS_SearchPartnerApiKey_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_AllValid_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key with valid data, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "unique", "value": "mpartner_policy_auth_req" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key with Only FilterCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key with Only PaginationCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "id", "sortType": "desc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key with Only SortCriteria, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_type_contains_Smoke_asc_sid, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "unique", "value": "mpartner_policy_auth_req" } ], "sort": "$IGNORE$", "pageFetch": "1", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKeyResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerApiRequestKey_type_contains_invalid_pagination, endPoint=/v1/partnermanager/partners/apikey/request/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "id", "type": "unique", "value": "mpartner_policy_auth_req" } ], "sort": "$IGNORE$", "pageFetch": "0", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerApiRequestKey/searchPartnerApiRequestKey, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner API Request Key while keeping Type parameter as contains and invalid pagination, uniqueIdentifier=TC_PMS_SearchPartnerApiRequestKey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "all", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner_policy_auth_req", "fieldCode": "mpartner_policy_auth_req" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner with valid values, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_Column_doesnt_exist, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "asdf", "type": "unique", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner while keeping invalid values in Column parameter, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_EmptyFilterColumn, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner while keeping FilterColumn parameter as Empty, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_EmptyFilterType, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner while keeping FilterType parameter as Empty, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_Invalid_type_doesnt_exist, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "sfga", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner while keeping invalid values in Type parameter, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_PartnerApiKeyRequestFilter_Valid_Smoke, endPoint=/v1/partnermanager/partners/apikey/request/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "id", "type": "unique", "text": "mpartner_policy_auth_req" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "id", "fieldValue": "mpartner_policy_auth_req", "fieldCode": "mpartner_policy_auth_req" } ] }, inputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilter, outputTemplate=pms/FilterAPIs/PartnerApiKeyRequestFilter/partnerApiKeyRequestFilterResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create ApiKeyRequestFilter for Partner with valid values, uniqueIdentifier=TC_PMS_PartnerApiKeyRequestFilter_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_AllValid_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type with all valid data, uniqueIdentifier=TC_PMS_createSearchPartnerType_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_Only_FilterCriteria_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "contains", "value": "Device_Provider" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type with Only FilterCriteria, uniqueIdentifier=TC_PMS_createSearchPartnerType_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_Only_PaginationCriteria_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type with Only PaginationCriteria, uniqueIdentifier=TC_PMS_createSearchPartnerType_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_Only_SortCriteria_Smoke, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "$REMOVE$", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type with Only SortCriteria, uniqueIdentifier=TC_PMS_createSearchPartnerType_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_contains_Smoke_asc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "contains", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type with valid data, uniqueIdentifier=TC_PMS_createSearchPartnerType_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_contains_Smoke_desc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "contains", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as contains and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPartnerType_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_equals_Smoke_asc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as contains and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPartnerType_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_equals_Smoke_desc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as equals and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPartnerType_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_startswith_Smoke_asc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "asc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as startswith and filter data in ascending order, uniqueIdentifier=TC_PMS_createSearchPartnerType_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_type_startswith_Smoke_desc, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "data": [ { "isActive": true } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as startswith and filter data in descending order, uniqueIdentifier=TC_PMS_createSearchPartnerType_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_invalid_columnName, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "co@@@@@343455666###4$$%%de", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-310" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping columnName parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartnerType_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_invalid_sort_field, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "mo@@@del" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping sortField parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartnerType_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_invalid_sort_type, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "dc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping sortType parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartnerType_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_invalid_value_equals, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "equals", "value": "a@@@334455667788s" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Value parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartnerType_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_invalid_value_startswith, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "a@@@334455667788s" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping value parameter as invalid, uniqueIdentifier=TC_PMS_createSearchPartnerType_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_missing_columnName, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "$REMOVE$", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-311" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping columnName parameter as empty, uniqueIdentifier=TC_PMS_createSearchPartnerType_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_missing_sort_field, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "$REMOVE$", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping sortField parameter as empty, uniqueIdentifier=TC_PMS_createSearchPartnerType_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_missing_sort_type, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "startswith", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "$REMOVE$" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping sortType parameter as empty, uniqueIdentifier=TC_PMS_createSearchPartnerType_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchPartnerType_with_missing_type, endPoint=/v1/partnermanager/partners/partnertype/search, role=partner, templateFields=null, input={ "filters": [ { "columnName": "code", "type": "$REMOVE$", "value": "Device_Provider" } ], "sort": [ { "sortField": "code", "sortType": "desc" } ], "pageFetch": "10", "pageStart": "0", "requesttime": "$TIMESTAMP$", "version": "v1" }, output={ "errors": [ { "errorCode": "PMS-MSD-312" } ] }, inputTemplate=pms/SearchAPIs/SearchPartnerType/createSearchPartnerType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Partner Type while keeping Type parameter as empty, uniqueIdentifier=TC_PMS_createSearchPartnerType_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_All_Approved_Ftm_Provider_AllValid_Smoke, endPoint=/v1/partnermanager/partners/v3?status=approved&partnerType=FTM_Provider, role=partnerftm, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the certificate for the Partner Id, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_CA_Cert_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderBeforeUploadingCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers before uploading CA certificates, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Before_Uploading_Partner_Cert_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProviderBeforeUploadingCertificates, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers before uploading Partner certificate, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers with Invalid access token, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_Get_All_Approved_Ftm_Provider_Without_Authentication_Neg, endPoint=/v1/partnermanager/partners/v4?status=approved&partnerType=FTM_Provider, role=invalidtoken, templateFields=null, input={ "partnerId": "pms-111888" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApprovedFtmProvider/GetAllApprovedFtmProvider, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all approved FTM Providers without Partner authentication, uniqueIdentifier=TC_PMS_GetAllApprovedFtmProviderNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_Invalid_Token_Neg, endPoint=/v1/partnermanager/ftpchipdetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details with Invalid access token, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_WhenNo_FTM_Chips_AddedNeg, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/GetListAllFTMChip/GetListAllFTMChipResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details when FTM Chips are not added for Partner, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_Without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerdevice, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details wwith Device Partner token, uniqueIdentifier=TC_PMS_GetListAllFTMChipNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Partner_CreateFTPChipDetail_All_Valid_Smoke_sid, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ "ftpProviderId": "pms-111888", "make": "Make123", "model": "MODEL-01", "requesttime": "$TIMESTAMP$" }, output={ "id": "$IGNORE$" }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create FTP Chip Deatils for Partner, uniqueIdentifier=TC_PMS_CreateFTPChipDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateFTPChipDetail_Missing_InputParameter_ftpId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpProviderId": "$REMOVE$", "make": "Make123", "model": "MODEL-01", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create FTP Chip Deatils for Partner while keeping ftpId parameter as missing, uniqueIdentifier=TC_PMS_CreateFTPChipDetail_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateFTPChipDetail_Missing_InputParameter_ftpProviderId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpProviderId": "FTP-AUTOMATION", "make": "$REMOVE$", "model": "MODEL-01", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create FTP Chip Deatils for Partner while keeping ftpProviderId parameter as missing, uniqueIdentifier=TC_PMS_CreateFTPChipDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ "ftpProviderId": "pms-111888", "make": "AcmeCorpFtm", "model": "mode2" }, output={ }, inputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetails, outputTemplate=pms/CreateFtmChipDetails/CreateFtmChipDetailsResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Ftm Chip Details, uniqueIdentifier=TC_PMS_createFtmChipDetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateFtpChipDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpChipDetailId": "$ID:CreateFTPChipDetail_All_Valid_Smoke_sid_id$", "make": "Make123Updated", "model": "MODEL-001", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/UpdateFtpChipDetail/updateFtpChipDetail, outputTemplate=pms/device/ftmChipDetails/update/updateFtpChipDetailResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update FTP Chip detail for Partner with valid details, uniqueIdentifier=TC_PMS_UpdateFtpChipDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateFtpChipDetail_Missing_InputParameter_ftpChipDetailId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "ftpChipDetailId": "$REMOVE$", "make": "Make123", "model": "MODEL-001", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/UpdateFtpChipDetail/updateFtpChipDetail, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update FTP Chip detail for Partner while keeping ftpChipDetailId parameter as missing, uniqueIdentifier=TC_PMS_UpdateFtpChipDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_Before_Uploading_Partner_Cert_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_011" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte with valid Partner ID, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacte_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_whichisPendingforCertUpload_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_010" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM which is Pending for Approval, uniqueIdentifier=TC_PMS_DeactivateFtm_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_forPendingforCertUpload_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_011" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte for Pending for Certificate Upload, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificate_AllValid_smoke_ftpProviderId, endPoint=/v1/partnermanager/ftpchipdetail/uploadcertificate, role=partnerftm, templateFields=null, input={ "requesttime":"$TIMESTAMP$", "ftpProviderId": "pms-111888", "ftpChipDeatilId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$", "isItForRegistrationDevice": true, "organizationName": "PMS_API_ABC_ORG", "partnerDomain": "DEVICE" }, output= { }, inputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChip, outputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChipResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload FTP chip Certificate, uniqueIdentifier=TC_PMS_UploadCertificateOfFtpChip_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificate_InValid_ftpChipId_neg, endPoint=/v1/partnermanager/ftpchipdetail/uploadcertificate, role=partner, templateFields=null, input={ "ftpProviderId": "pms-111888", "ftpChipDeatilId": "asdf", "isItForRegistrationDevice": true, "organizationName": "PMS_API_ABC_ORG", "partnerDomain": "DEVICE" }, output= { "errors": [ { "errorCode": "PMP_AUT_031" } ] }, inputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChip, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Certificate for FTP chip provider Partner while keeping ftpChipId parameter as invalid, uniqueIdentifier=TC_PMS_UploadCertificateOfFtpChip_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UploadCertificate_InValid_ftpProviderId_neg, endPoint=/v1/partnermanager/ftpchipdetail/uploadcertificate, role=partner, templateFields=null, input={ "ftpProviderId": "asdgfb", "ftpChipDeatilId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$", "isItForRegistrationDevice": true, "organizationName": "ftp", "partnerDomain": "DEVICE" }, output= { "errors": [ { "errorCode": "PMP_AUT_030" } ] }, inputTemplate=pms/UploadCertificateOfFtpChip/UploadCertificateOfFtpChip, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Upload Certificate for FTP chip provider Partner while keeping ftpProviderId parameter as invalid, uniqueIdentifier=TC_PMS_UploadCertificateOfFtpChip_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_whichisPendingforApproval_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_010" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM which is Pending for Approval, uniqueIdentifier=TC_PMS_DeactivateFtm_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveFTMChipDetail_allValid_smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partneradmin, templateFields=null, input={ "ftpChipDetailId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$", "approvalStatus": true }, output={ }, inputTemplate=pms/ApproveFTMChipDetail/ApproveFTMChipDetail, outputTemplate=pms/ApproveFTMChipDetail/ApproveFTMChipDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve FTM Chip Detail, uniqueIdentifier=TC_PMS_ApproveFTMchipDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveFtpChipDetail_Missing_InputParameter_ftpChipDetailId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "approvalStatus": true, "ftpChipDetailId": "$REMOVE$", "isItForRegistrationDevice": true, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/ApproveFTMChipDetail/ApproveFTMChipDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update FTM Chip provider Partner while keeping ftpChipDetailID as missing, uniqueIdentifier=TC_PMS_ApproveFtpChipDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_rejectFtpChipDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "approvalStatus": false, "ftpChipDetailId": "$ID:CreateFTPChipDetail_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/RejectFtpChipDetail/rejectFtpChipDetail, outputTemplate=pms/RejectFtpChipDetail/rejectFtpChipDetailResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject FTP Chip detail for Partner, uniqueIdentifier=TC_PMS_rejectFtpChipDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_rejectFtpChipDetail_Missing_InputParameter_ftpChipDetailId, endPoint=/v1/partnermanager/ftpchipdetail, role=partner, templateFields=null, input={ "approvalStatus": true, "ftpChipDetailId": "$REMOVE$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/RejectFtpChipDetail/rejectFtpChipDetail, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Reject FTP Chip detail for Partner while keeping ftpChipDetailId paramter as missing, uniqueIdentifier=TC_PMS_rejectFtpChipDetail_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetFtpChipDetail_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail/getPartnerCertificate/{ftpChipDetailId}, role=partner, templateFields=null, input={ "ftpChipDetailId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/GetFtpChipDetail/getFtpChipDetail, outputTemplate=pms/GetFtpChipDetail/getFtpChipDetailResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive FTP ChipDetails Partner with valid detail, uniqueIdentifier=TC_PMS_GetFTPChipDetail_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListAllFTMChip_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail, role=partnerftm, templateFields=null, input={ }, output= { "partnerId": "pms-111888", "make": "AcmeCorpFtm", "model": "mode2 }, inputTemplate=pms/GetListAllFTMChip/GetListAllFTMChip, outputTemplate=pms/GetListAllFTMChip/GetListAllFTMChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all FTM chip details with valid details, uniqueIdentifier=TC_PMS_GetListAllFTMChip_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_allValid_smoke, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalPartnerCertificatesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte with valid Partner ID, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacte_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_Invalid_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "0191230330" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_Invalid_Value_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "fsadf" }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte while keeping FTM ID parameter as Invalid and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_SpaceVla_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": " " }, output={ "errors": [ { "errorCode": "PMS_PRT_099" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte while keeping FTM ID parameter as Missing and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_with_Invalid_AccessToken_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=invalidtoken, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte with invalid partner access token and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalPartnerCertificates_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=invalidtoken, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetOriginalFtmCertifacte/GetOriginalFtmCertifacte, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Original FTM Certifacte without partner Authentication and expecting an error in the response, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail, uniqueIdentifier=TC_PMS_FTM_chip_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_make_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?make={make}, role=partneradmin, templateFields=null, input={ "make": "abcd", "pageSize": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for make value contains 'abcd', uniqueIdentifier=TC_PMS_FTM_chip_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_model_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?model={model}, role=partneradmin, templateFields=null, input={ "model": "xyz", "make": "$REMOVE$", "pageSize": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for model value contains 'xyz', uniqueIdentifier=TC_PMS_FTM_chip_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_orgName_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?orgName={orgName}, role=partneradmin, templateFields=null, input={ "orgName": "1", "sortType": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for orgName which contains '1', uniqueIdentifier=TC_PMS_FTM_chip_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_pagesize_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "5", "status": "$REMOVE$", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for pageSize specified, uniqueIdentifier=TC_PMS_FTM_chip_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_partnerId_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "a", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for partnerId which contains 'a', uniqueIdentifier=TC_PMS_FTM_chip_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_random_value_given, endPoint=/v1/partnermanager/ftpchipdetail/v2?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "16263gdvddgdv", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by giving random value for partnerId, uniqueIdentifier=TC_PMS_FTM_chip_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_sortType_ASC, endPoint=/v1/partnermanager/ftpchipdetail/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "ASC", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by sort type ASC for the given sort field, uniqueIdentifier=TC_PMS_FTM_chip_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_sortType_DESC, endPoint=/v1/partnermanager/ftpchipdetail/v2?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "DESC", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by sort type DESC for the given sort field, uniqueIdentifier=TC_PMS_FTM_chip_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_approved, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as approved, uniqueIdentifier=TC_PMS_FTM_chip_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_deactivated, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as deactivated, uniqueIdentifier=TC_PMS_FTM_chip_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_pending_approval, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as pending_approval, uniqueIdentifier=TC_PMS_FTM_chip_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_pending_cert_upload, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_cert_upload", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as pending_cert_upload, uniqueIdentifier=TC_PMS_FTM_chip_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_status_given_rejected, endPoint=/v1/partnermanager/ftpchipdetail/v2?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "partnerId": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getListOfFtmChipResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail for status as rejected, uniqueIdentifier=TC_PMS_FTM_chip_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_with_with_combination_search_twofields, endPoint=/v1/partnermanager/ftpchipdetail/v2?make={make}&model={model}, role=partneradmin, templateFields=null, input={ "make": "1", "model": "2", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "status": "$REMOVE$", "sortFieldName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfFtmChip/getAllPartnerPolicyRequestResultWithArray, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail by giving value for both make and model, uniqueIdentifier=TC_PMS_FTM_chip_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_Negative_pageNo_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "pageNo": "-6", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with negative pageNo, uniqueIdentifier=TC_PMS_FTM_chip_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_Negative_pagesize_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "pageSize": "-6", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with negative pagesize, uniqueIdentifier=TC_PMS_FTM_chip_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_invalid_sortType_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "sortType": "$%$^&&", "sortFieldName": "$REMOVE$", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with invalid sortType, uniqueIdentifier=TC_PMS_FTM_chip_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_invalid_sortfield_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ "sortFieldName": "$%$^&&", "partnerId": "$REMOVE$", "model": "$REMOVE$", "make": "$REMOVE$", "pageSize": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$" }, output={ "pageNo": "0" }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/GetListOfPartners/getListOfPartnersResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with invalid sortfieldname, uniqueIdentifier=TC_PMS_FTM_chip_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_invalid_token_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail with invalid token, uniqueIdentifier=TC_PMS_FTM_chip_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfFtmChip_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfFtmChip/getListOfFtmChip, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the ftpchipdetail without authentication, uniqueIdentifier=TC_PMS_FTM_chip_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Invalid_orgName_Neg, endPoint=/v1/partnermanager/securebiometricinterface?orgName={orgName}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "*PMS", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI with invalid orgName, uniqueIdentifier=TC_PMS_SBI_List_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Invalid_sbiID_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sbiId={sbiId}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "*12*", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI with invalid sbiID, uniqueIdentifier=TC_PMS_SBI_List_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Invalid_sbiVersion_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "*PMS", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI with invalid sbiVersion, uniqueIdentifier=TC_PMS_SBI_List_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Only_sortFieldName_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "partnerId", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI by selecting only sortFieldName without selecting sortType and sortFieldName, uniqueIdentifier=TC_PMS_SBI_List_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_Only_sortType_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "asc", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI by selecting only sortType without selecting sortFieldName, uniqueIdentifier=TC_PMS_SBI_List_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_SBI_Version_Special_Character_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sbiVersion={sbiVersion}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "@#", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output= { "totalResults": "0" }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/GetListOfAllSBI/getListOfAllSBITotalResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the SBI Version with passing Special Character, uniqueIdentifier=TC_PMS_SBI_List_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_partnerId_Neg, endPoint=/v1/partnermanager/securebiometricinterface?partnerId={partnerId}, role=partnerdevice, templateFields=null, input={ "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "*11", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with negative pageNo value, uniqueIdentifier=TC_PMS_SBI_List_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}&sortType={sortType}&pageNo={pageNo}&pageSize={pageSize}, role=partnerdevice, templateFields=null, input={ "pageNo": "0", "pageSize": "4", "sortType": "asc", "sortFieldName": "partner", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with invalid sortFieldName, uniqueIdentifier=TC_PMS_SBI_List_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_sortType_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortType={sortType}, role=partnerdevice, templateFields=null, input={ "sortType": "$%$^&&", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with invalid sortType, uniqueIdentifier=TC_PMS_SBI_List_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_sortfield_Neg, endPoint=/v1/partnermanager/securebiometricinterface?sortFieldName={sortFieldName}, role=partnerdevice, templateFields=null, input={ "sortFieldName": "$%$^&&", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "pageSize": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with invalid sortfield, uniqueIdentifier=TC_PMS_SBI_List_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_invalid_token_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with invalid token, uniqueIdentifier=TC_PMS_SBI_List_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_negative_pageNo_Neg, endPoint=/v1/partnermanager/securebiometricinterface?pageNo={pageNo}, role=partnerdevice, templateFields=null, input={ "pageNo": "-7", "pageSize": "$REMOVE$", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with negative pageNo value, uniqueIdentifier=TC_PMS_SBI_List_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_negative_pageSize_Neg, endPoint=/v1/partnermanager/securebiometricinterface?pageSize={pageSize}, role=partnerdevice, templateFields=null, input={ "pageSize": "-7", "sortType": "$REMOVE$", "sortFieldName": "$REMOVE$", "status": "$REMOVE$", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "sbiVersion": "$REMOVE$", "orgName": "$REMOVE$", "sbiId": "$REMOVE$", "policyId": "$REMOVE$", "sbiExpiryStatus": "$REMOVE$", "expiryPeriod": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI with negative pagesize value, uniqueIdentifier=TC_PMS_SBI_List_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllSBI_without_Authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllSBI/getListOfAllSBI, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the active SBI without Authentication, uniqueIdentifier=TC_PMS_SBI_List_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_All_Valid_Smoke, endPoint=/v1/partnermanager/devicedetail, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices, uniqueIdentifier=TC_PMS_devicedetails_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceId_given, endPoint=/v1/partnermanager/devicedetail?deviceId={deviceId}, role=partneradmin, templateFields=null, input={ "deviceId": "9", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with deviceId given as '9', uniqueIdentifier=TC_PMS_devicedetails_22 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceId_random_value_given, endPoint=/v1/partnermanager/devicedetail?deviceId={deviceId}, role=partneradmin, templateFields=null, input={ "deviceId": "d", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with random value given for deviceid, uniqueIdentifier=TC_PMS_devicedetails_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceSubType_given, endPoint=/v1/partnermanager/devicedetail?deviceSubType={deviceSubType}, role=partneradmin, templateFields=null, input={ "deviceSubType": "f", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with deviceSubType given as 'i', uniqueIdentifier=TC_PMS_devicedetails_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_deviceType_given, endPoint=/v1/partnermanager/devicedetail?deviceType={deviceType}, role=partneradmin, templateFields=null, input={ "deviceType": "i", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with deviceType given as 'i', uniqueIdentifier=TC_PMS_devicedetails_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_invalid_sortfield_Neg, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortFieldName": "$$$$$$", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortType": "DESC", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with invalid sortFieldName, uniqueIdentifier=TC_PMS_devicedetails_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_invalid_sorttype, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortType": "device", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "make", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_358" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with invalid sorttype, uniqueIdentifier=TC_PMS_devicedetails_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_invalid_token, endPoint=/v1/partnermanager/devicedetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with invalid token, uniqueIdentifier=TC_PMS_devicedetails_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_make_given, endPoint=/v1/partnermanager/devicedetail?make={make}, role=partneradmin, templateFields=null, input={ "make": "3", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with make given as '3', uniqueIdentifier=TC_PMS_devicedetails_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_model_given, endPoint=/v1/partnermanager/devicedetail?model={model}, role=partneradmin, templateFields=null, input={ "model": "4", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with model given as '4', uniqueIdentifier=TC_PMS_devicedetails_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_multiple_attribute_values_given, endPoint=/v1/partnermanager/devicedetail?make={make}&model={model}, role=partneradmin, templateFields=null, input={ "make": "1", "model": "1", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "orgName": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with make and model is given, uniqueIdentifier=TC_PMS_devicedetails_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_negative_pageno, endPoint=/v1/partnermanager/devicedetail?pageNo={pageNo}, role=partneradmin, templateFields=null, input={ "pageNo": "-5", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with negative pageno, uniqueIdentifier=TC_PMS_devicedetails_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_negative_pagesize, endPoint=/v1/partnermanager/devicedetail?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "-5", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with negative pageSize, uniqueIdentifier=TC_PMS_devicedetails_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sbiId_given, endPoint=/v1/partnermanager/devicedetail?sbiId={sbiId}, role=partneradmin, templateFields=null, input={ "sbiId": "q", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sbiId given as 'q', uniqueIdentifier=TC_PMS_devicedetails_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sbiversion_given, endPoint=/v1/partnermanager/devicedetail?sbiVersion={sbiVersion}, role=partneradmin, templateFields=null, input={ "sbiVersion": "abcd", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sbiVersion given as 'abcd', uniqueIdentifier=TC_PMS_devicedetails_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sorttype_asc, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}, role=partneradmin, templateFields=null, input={ "sortType": "asc", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sorttype as 'asc', uniqueIdentifier=TC_PMS_devicedetails_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_sorttype_desc, endPoint=/v1/partnermanager/devicedetail?sortType={sortType}&sortFieldName={sortFieldName}, role=partneradmin, templateFields=null, input={ "sortType": "desc", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "status", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output={ }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with sorttype as 'desc', uniqueIdentifier=TC_PMS_devicedetails_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_orgName, endPoint=/v1/partnermanager/devicedetail?orgName={orgName}, role=partneradmin, templateFields=null, input={ "orgName": "1", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with orgName value given as '1', uniqueIdentifier=TC_PMS_devicedetails_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_pagesize_specified, endPoint=/v1/partnermanager/devicedetail?pageSize={pageSize}, role=partneradmin, templateFields=null, input={ "pageSize": "7", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "pageNo": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "status": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with pagesize specified, uniqueIdentifier=TC_PMS_devicedetails_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_partnerid, endPoint=/v1/partnermanager/devicedetail?partnerId={partnerId}, role=partneradmin, templateFields=null, input={ "partnerId": "a", "status": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with partnerid value given as 'a', uniqueIdentifier=TC_PMS_devicedetails_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_approved, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "approved", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as approved, uniqueIdentifier=TC_PMS_devicedetails_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_deactivated, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "deactivated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as deactivated, uniqueIdentifier=TC_PMS_devicedetails_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_pending_approval, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "pending_approval", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as pending_approval, uniqueIdentifier=TC_PMS_devicedetails_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_with_status_rejected, endPoint=/v1/partnermanager/devicedetail?status={status}, role=partneradmin, templateFields=null, input={ "status": "rejected", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "sortFieldName": "$REMOVE$", "sortType": "$REMOVE$", "make": "$REMOVE$", "orgName": "$REMOVE$", "model": "$REMOVE$", "deviceType": "$REMOVE$", "deviceSubType": "$REMOVE$", "sbiVersion": "$REMOVE$", "sbiId": "$REMOVE$", "deviceId": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/GetListOfAllDevice/getListOfAllDeviceResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices with status as rejected, uniqueIdentifier=TC_PMS_devicedetails_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfAllDevice_without_Authentication, endPoint=/v1/partnermanager/devicedetail, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfAllDevice/getListOfAllDevice, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching list of all the devices without authentication, uniqueIdentifier=TC_PMS_devicedetails_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetCountOfFtm_All_Valid_Smoke, endPoint=/v1/partnermanager/ftpchipdetail/v2, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetCountOfFtm/getCountOfFtm, outputTemplate=pms/GetCountOfFtm/getCountOfFtmResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all active FTM, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllSystemConfigs_All_Valid_Smoke, endPoint=/v1/partnermanager/system-config, role=patneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartner, outputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartnerResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the configuration for PMS, uniqueIdentifier=TC_PMS_GetAllSystemConfigs_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllSystemConfigs_without_authentication_Neg, endPoint=/v1/partnermanager/system-config, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllSystemConfigs/getAllApiKeyForAuthPartner, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the configuration for PMS without authentication, uniqueIdentifier=TC_PMS_GetAllSystemConfigs_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllRootCertificate_allValid_smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ }, output={ "caCertificateType": "ROOT" }, inputTemplate=pms/GetAllRootCertificate/getAllRootCertificate, outputTemplate=pms/GetAllRootCertificate/getAllRootCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the root certificates of the Logged in Partner, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys, role=partnerauth, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Keys, uniqueIdentifier=TC_PMS_GetListOfApiKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_individual_partner_Neg, endPoint=/v1/partnermanager/partner-api-keys?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "pageSize": "$REMOVE$", "partnerId": "pms-111998", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfAllDeviceResultNegative, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with individual partner, uniqueIdentifier=TC_PMS_GetListOfApiKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_invalid_pageSize, endPoint=/v1/partnermanager/partner-api-keys?pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageSize": "-5", "partnerId": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with pageSize, uniqueIdentifier=TC_PMS_GetListOfApiKey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_invalid_sortType_Neg, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}, role=partnerauth, templateFields=null, input={ "sortType": "cas", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with invalid sortType, uniqueIdentifier=TC_PMS_GetListOfApiKey_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_negative_pageNo_Neg, endPoint=/v1/partnermanager/partner-api-keys?pageNo={pageNo}, role=partnerauth, templateFields=null, input={ "pageNo": "-1", "pageSize": "$REMOVE$", "partnerId": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with negative pageNo, uniqueIdentifier=TC_PMS_GetListOfApiKey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_negative_pageSize_Neg, endPoint=/v1/partnermanager/partner-api-keys?pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "pageSize": "-5", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with negative pageSize, uniqueIdentifier=TC_PMS_GetListOfApiKey_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_apiKeyLabel_value, endPoint=/v1/partnermanager/partner-api-keys?apiKeyLabel={apiKeyLabel}, role=partnerauth, templateFields=null, input={ "apiKeyLabel": "tyy1", "policyName": "$REMOVE$", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with partial apiKeyLabel values, uniqueIdentifier=TC_PMS_GetListOfApiKey_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_orgName_value, endPoint=/v1/partnermanager/partner-api-keys?orgName={orgName}, role=partnerauth, templateFields=null, input={ "orgName": "sp", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with partial orgName value, uniqueIdentifier=TC_PMS_GetListOfApiKey_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_partnerId_value, endPoint=/v1/partnermanager/partner-api-keys?partnerId={partnerId}, role=partnerauth, templateFields=null, input={ "partnerId": "A", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys on passing partial partnerId value, uniqueIdentifier=TC_PMS_GetListOfApiKey_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_policyGroupName_value, endPoint=/v1/partnermanager/partner-api-keys?policyGroupName={policyGroupName}, role=partnerauth, templateFields=null, input={ "policyGroupName": "1", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys on passing partial policyGroupName value, uniqueIdentifier=TC_PMS_GetListOfApiKey_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_partial_policyName_value, endPoint=/v1/partnermanager/partner-api-keys?policyName={policyName}, role=partnerauth, templateFields=null, input={ "policyName": "pqr", "orgName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with partial policyName values, uniqueIdentifier=TC_PMS_GetListOfApiKey_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_random_data, endPoint=/v1/partnermanager/partner-api-keys?orgName={orgName}, role=partnerauth, templateFields=null, input={ "orgName": "zz6762j", "apiKeyLabel": "$REMOVE$", "policyName": "$REMOVE$", "sortType": "$REMOVE$", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "status": "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with random values given to a valid parameter, uniqueIdentifier=TC_PMS_GetListOfApiKey_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_status_activated, endPoint=/v1/partnermanager/partner-api-keys?status={status}, role=partnerauth, templateFields=null, input={ "status": "activated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with status activated, uniqueIdentifier=TC_PMS_GetListOfApiKey_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_status_deactivated, endPoint=/v1/partnermanager/partner-api-keys?status={status}, role=partnerauth, templateFields=null, input={ "status": "deactivated", "pageSize": "$REMOVE$", "pageNo": "$REMOVE$", "partnerId": "$REMOVE$", "policyGroupName": "$REMOVE$", "sortType" : "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with status deactivated, uniqueIdentifier=TC_PMS_GetListOfApiKey_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_valid_ascending_sortType, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=partnerId&pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "sortType": "ASC", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "10", "pageNo": "0", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with ascending sortType, uniqueIdentifier=TC_PMS_GetListOfApiKey_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_with_valid_descending_sortType, endPoint=/v1/partnermanager/partner-api-keys?sortType={sortType}&sortFieldName=orgName&pageNo={pageNo}&pageSize={pageSize}, role=partnerauth, templateFields=null, input={ "sortType": "DESC", "policyGroupName": "$REMOVE$", "partnerId": "$REMOVE$", "pageSize": "10", "pageNo": "0", "status": "$REMOVE$", "orgName" : "$REMOVE$", "policyName" : "$REMOVE$", "apiKeyLabel" : "$REMOVE$" }, output= { }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/GetListOfApiKey/getListOfApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys with ascending sortType, uniqueIdentifier=TC_PMS_GetListOfApiKey_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetListOfApiKey_without_authentication_Neg, endPoint=/v1/partnermanager/partner-api-keys, role=invalidtoken, templateFields=null, input={ }, output= { "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetListOfApiKey/getListOfApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching the API Keys without authentication, uniqueIdentifier=TC_PMS_GetListOfApiKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DownloadRootCertificate_allValid_smoke, endPoint=/v1/partnermanager/trust-chain-certificates/{certificateId}/certificateFile, role=partneradmin, templateFields=null, input={ }, output={ }, inputTemplate=pms/DownloadRootCertificate/downloadRootCertificate, outputTemplate=pms/DownloadRootCertificate/downloadRootCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the root certificates of the Logged in Partner, uniqueIdentifier=null |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateMispLicense_InValid_ProviderId, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "asdfgsd", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_MSP_005" } ] }, inputTemplate=pms/MispLicense/CreateMispLicense/createMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP License Partner while keeping invalid ProviderID, uniqueIdentifier=TC_PMS_CreateMispLicense_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateMispLicense_MispLicense_allValid_smoke_sid, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "MISP2-AUTOMATION", "requesttime": "$TIMESTAMP$" }, output={ "providerId": "MISP2-AUTOMATION", "licenseKeyStatus": "Active" }, inputTemplate=pms/MispLicense/CreateMispLicense/createMispLicense, outputTemplate=pms/MispLicense/CreateMispLicense/createMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP License Partner with all valid details, uniqueIdentifier=TC_PMS_CreateMispLicense_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateMispLicense_allValid_smoke_sid, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "MISP-AUTOMATION", "requesttime": "$TIMESTAMP$" }, output={ "providerId": "MISP-AUTOMATION", "licenseKeyStatus": "Active" }, inputTemplate=pms/MispLicense/CreateMispLicense/createMispLicense, outputTemplate=pms/MispLicense/CreateMispLicense/createMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MISP License Partner, uniqueIdentifier=TC_PMS_CreateMispLicense_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMispLicense_allValid_smoke, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ }, output={ }, inputTemplate=pms/MispLicense/GetMispLicense/getMispLicense, outputTemplate=pms/MispLicense/GetMispLicense/getMispLicenseResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive MispLicense for Partner, uniqueIdentifier=TC_PMS_GetMispLicense_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateMispLicense_Active_allValid_smoke, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "MISP2-AUTOMATION", "licenseKeyStatus": "Active", "licenseKey": "$ID:CreateMispLicense_MispLicense_allValid_smoke_sid_licenseKey$" }, output={ "providerId": "MISP2-AUTOMATION", "licenseKeyStatus": "active" }, inputTemplate=pms/MispLicense/UpdateMispLicense/updateMispLicense, outputTemplate=pms/MispLicense/UpdateMispLicense/updateMispLicenseResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update MispLicense Partner as active, uniqueIdentifier=TC_PMS_UpdateMispLicense_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateMispLicense_Deactive_allValid_smoke, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "MISP-AUTOMATION", "licenseKeyStatus": "De-active", "licenseKey": "$ID:CreateMispLicense_allValid_smoke_sid_licenseKey$" }, output={ "providerId": "MISP-AUTOMATION", "licenseKeyStatus": "de-active" }, inputTemplate=pms/MispLicense/UpdateMispLicense/updateMispLicense, outputTemplate=pms/MispLicense/UpdateMispLicense/updateMispLicenseResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update MispLicense Partner as Deactive, uniqueIdentifier=TC_PMS_UpdateMispLicense_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateMispLicense_InValid_licenseKeyStatus, endPoint=/v1/partnermanager/misps, role=partner, templateFields=null, input={ "providerId": "MISP-AUTOMATION", "licenseKeyStatus": "inactive", "licenseKey": "adfvad" }, output={ "errors": [ { "errorCode": "PMS_MSP_407" } ] }, inputTemplate=pms/MispLicense/UpdateMispLicense/updateMispLicense, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update MispLicense for Partner with InValid_licenseKeyStatus, uniqueIdentifier=TC_PMS_UpdateMispLicense_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPLicenseByMispID__Active_allValid_smoke, endPoint=/v1/partnermanager/misps/{mispId}/licenseKey, role=partner, templateFields=null, input={ "mispId": "MISP2-AUTOMATION" }, output={ "providerId": "MISP2-AUTOMATION", "licenseKeyStatus": "Active" }, inputTemplate=pms/MispLicense/GetMISPLicenseByMispID/getMISPLicenseByMispID, outputTemplate=pms/MispLicense/GetMISPLicenseByMispID/getMISPLicenseByMispIDResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive MISPLicense for Activate MispID, uniqueIdentifier=TC_PMS_GetMISPLicenseByMispID_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPLicenseByMispID__Deactive_allValid_smoke, endPoint=/v1/partnermanager/misps/{mispId}/licenseKey, role=partner, templateFields=null, input={ "mispId": "MISP-AUTOMATION" }, output={ "providerId": "MISP-AUTOMATION", "licenseKeyStatus": "Active" }, inputTemplate=pms/MispLicense/GetMISPLicenseByMispID/getMISPLicenseByMispID, outputTemplate=pms/MispLicense/GetMISPLicenseByMispID/getMISPLicenseByMispIDResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive MISPLicense for Deactivate MispID, uniqueIdentifier=TC_PMS_GetMISPLicenseByMispID_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetMISPLicenseByMispID_inValid_smoke, endPoint=/v1/partnermanager/misps/{mispId}/licenseKey, role=partner, templateFields=null, input={ "mispId": "abc" }, output={ "errors": [ { "errorCode": "PMS_MSP_005" } ] }, inputTemplate=pms/MispLicense/GetMISPLicenseByMispID/getMISPLicenseByMispID, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retreive MISPLicense for invalid MispID, uniqueIdentifier=TC_PMS_GetMISPLicenseByMispID_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Blank_SortField, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-314" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with Empty Sort Field, uniqueIdentifier=TC_PMS_SearchMispLicense_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Invalid_NegPageFetch, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": -1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with invalid Page fetch, uniqueIdentifier=TC_PMS_SearchMispLicense_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Invalid_NegPageStart, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": -1, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-313" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with invalid Page Start, uniqueIdentifier=TC_PMS_SearchMispLicense_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Invalid_SortField_neg, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createddDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-357" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with invalid SortField, uniqueIdentifier=TC_PMS_SearchMispLicense_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Invalid_SortType_neg, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "asdf" }], "pageStart": 0, "pageFetch": 1, "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-358" } ] }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with invalid SortType, uniqueIdentifier=TC_PMS_SearchMispLicense_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Valid_Filter_Name, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "equals", "value": "true" }], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 10, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with valid Filter Name, uniqueIdentifier=TC_PMS_SearchMispLicense_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_SearchMispLicense_Valid_Smoke, endPoint=/v1/partnermanager/misps/search, role=partner, templateFields=null, input={ "filters": [], "sort": [{ "sortField": "createdDateTime", "sortType": "ASC" }], "pageStart": 0, "pageFetch": 10, "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicense, outputTemplate=pms/MispLicense/SearchMispLicense/searchMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Search Misp License with valid details, uniqueIdentifier=TC_PMS_SearchMispLicense_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_All_Valid_Smoke, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "all", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "isActive", "fieldValue": "true" }, { "fieldID": "isActive", "fieldValue": "false" } ], "errors": null }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping Type All, uniqueIdentifier=TC_PMS_FilterMispLicense_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_Blank_FilterType, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-322" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping Type parameter as Empty, uniqueIdentifier=TC_PMS_FilterMispLicense_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_InValid_Empty_columnName, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "", "type": "unique", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_COR_001" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping ColumnName parameter as Empty, uniqueIdentifier=TC_PMS_FilterMispLicense_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_InValid_FilterType, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "iSActive", "type": "between", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-324" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping Text parameter as Empty, uniqueIdentifier=TC_PMS_FilterMispLicense_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_InValid_columnName, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "lang_code", "type": "unique", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS-MSD-317" } ] }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping ColumnName parameter as Invalid, uniqueIdentifier=TC_PMS_FilterMispLicense_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_FilterMispLicense_Valid_Smoke, endPoint=/v1/partnermanager/misps/filtervalues, role=partner, templateFields=null, input={ "filters": [{ "columnName": "isActive", "type": "unique", "text": "" }], "requesttime": "$TIMESTAMP$" }, output={ "filters": [ { "fieldID": "isActive", "fieldValue": "true" }, { "fieldID": "isActive", "fieldValue": "false" } ], "errors": null }, inputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicense, outputTemplate=pms/MispLicense/FilterMispLicense/filterMispLicenseResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create MispLicense Filter for Partner while keeping Type Unique, uniqueIdentifier=TC_PMS_FilterMispLicense_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerApiKeyRequest_InValid_partnerId_neg, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/request, role=partner, templateFields=null, input={ "partnerId": "fqgfg" }, output={ "errors": [ { "errorCode": "PMS_PRT_006" } ] }, inputTemplate=pms/GetPartnerApiKeyRequest/getPartnerApiKeyRequest, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve ApiKeyRequests for Partner while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_GetPartnerApiKeyRequest_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetBioExtractors_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "afgebv", "policyId": "mpolicy-default-auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_064", "message": "No details found" } ] }, inputTemplate=pms/GetBioExtractors/getBioExtractors, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Bio Extractors for Partner while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_GetBioExtractors_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetBioExtractors_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "policyId": "mpolicy-default-auth" }, output={ }, inputTemplate=pms/GetBioExtractors/getBioExtractors, outputTemplate=pms/GetBioExtractors/getBioExtractorsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Bio Extractors for Partner, uniqueIdentifier=TC_PMS_GetBioExtractors_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateBioExtractors_InValid_PolicyId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "policyId": "vdsfhfx", "attributeName": "iris", "biometric": "iris", "provider": "mock", "version": "1.1", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/CreateBioExtractors/createBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create BioExtractors for Partner with invalid PolicyID, uniqueIdentifier=TC_PMS_CreateBioExtractors_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_CreateBioExtractors_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/bioextractors/{policyId}, role=partner, templateFields=null, input={ "partnerId": "asvgasfbkasdm", "policyId": "mpolicy-default-auth", "attributeName": "iris", "biometric": "iris", "provider": "mock", "version": "1.1", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PRT_061" } ] }, inputTemplate=pms/CreateBioExtractors/createBioExtractors, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create BioExtractors for Partner with invalid PartnerID, uniqueIdentifier=TC_PMS_CreateBioExtractors_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_AllValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111999", "credentialType": "auth", "policyId": "mosip policy" }, output={ }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialTypeResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_InValid_credentialType, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "credentialType": "sfdgsaefhb", "policyId": "mpolicy-default-auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_072" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid CredentialType, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "asvgasfbkasdm", "credentialType": "auth", "policyId": "mpolicy-default-auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_InValid_policyId, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "mpartner-default-auth", "credentialType": "auth", "policyId": "asrhtaeh" }, output={ "errors": [ { "errorCode": "PMS_PRT_073" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid PolicyId, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_MapTo_Inactive_Policy_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partner, templateFields=null, input={ "partnerId": "MISP3", "credentialType": "auth", "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_PMP_016" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner while keeping invalid inactive Policy, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_MapPartnerAndPolicytoCredentialType_Map_Again_Dublicate_Neg, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies/{policyId}, role=partneradmin, templateFields=null, input={ "partnerId": "pms-111999", "credentialType": "auth", "policyId": "mosip policy" }, output={ "errors": [ { "errorCode": "PMS_PRT_007" } ] }, inputTemplate=pms/MapPartnerAndPolicytoCredentialType/mapPartnerAndPolicytoCredentialType, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Mapping between Partner and Policy to CredentialType Partner while keeping duplicate PartnerId, uniqueIdentifier=TC_PMS_MapPartnerAndPolicytoCredentialType_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyforMappedPartnerAndCredentialtype_AllValid_Smoke, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "credentialType": "auth" }, output={ "partnerId": "pms-111999", "credentialType": "auth", "policyName": "mosip policy" }, inputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtype, outputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtypeResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy for MappedPartner and CredentialType Partner, uniqueIdentifier=TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyforMappedPartnerAndCredentialtype_InValid_credentialType, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies, role=partner, templateFields=null, input={ "partnerId": "MOVP-AUTOMATION", "credentialType": "asfgr" }, output={ "errors": [ { "errorCode": "PMS_PRT_064" } ] }, inputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtype, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy for MappedPartner and CredentialType Partner while keeping invalid CredentialType, uniqueIdentifier=TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyforMappedPartnerAndCredentialtype_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/credentialtype/{credentialType}/policies, role=partner, templateFields=null, input={ "partnerId": "asdg", "credentialType": "auth" }, output={ "errors": [ { "errorCode": "PMS_PRT_064" } ] }, inputTemplate=pms/GetPolicyforMappedPartnerAndCredentialtype/getPolicyforMappedPartnerAndCredentialtype, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy for MappedPartner and CredentialType Partner while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_GetPolicyforMappedPartnerAndCredentialtype_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRoles_allValid_smoke, endPoint=/v1/partnermanager/roles, role=partner, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetRoles/getRoles, outputTemplate=pms/GetRoles/getRolesResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve all Partner Roles, uniqueIdentifier=TC_PMS_GetRoles_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_activate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MISP-AUTOMATION", "requesttime": "$TIMESTAMP$", "status": "Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Activated Partner as Activate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_MISP3, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MISP3", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated MISP Partner as Deactivate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_Tech-1233, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "Tech-1233", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated Tech-1233 Partner as Deactivate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_Tech_321, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "Tech-321", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated Tech-321 Partner as Deactivate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_deactivate_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "MOVP-AUTOMATION", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartnerResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated Partner as Deactivate, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ActivateDeactivatePartner_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}, role=partner, templateFields=null, input={ "partnerId": "asdfgrwg", "requesttime": "$TIMESTAMP$", "status": "De-Active" }, output={ "errors": [ { "errorCode": "PMS_PMP_005" } ] }, inputTemplate=pms/ActivateDeactivatePartner/activateDeactivatePartner, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update the status for Deactivated Partner as Deactivate for Invalid PartnerID, uniqueIdentifier=TC_PMS_ActivateDeactivatePartner_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetApiKeyRequests_allValid_smoke, endPoint=/v1/partnermanager/partners/apikey, role=partner, templateFields=null, input={ }, output={ }, inputTemplate=pms/GetApiKeyRequests/getApiKeyRequests, outputTemplate=pms/GetApiKeyRequests/getApiKeyRequestsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve ApiKeyRequests for Partner, uniqueIdentifier=TC_PMS_GetApiKeyRequests_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=SELECT module_name,cr_by FROM audit.app_audit_log where module_name LIKE '%partner%' order by action_dtimes desc LIMIT 5, role=audit, templateFields=[partnerQuery, partner service], input={ }, output={ "module_name": "partner service" "cr_by": "111997" }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get the AuditLogs for add contact scenario, uniqueIdentifier=TC_PMS_addContact_01 |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyForApiKey_InValid_apiKey, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}, role=partner, templateFields=null, input={ "partnerId": "110124", "apiKey": "dhbg" }, output={ "errors": [ { "errorCode": "PMS_PMP_009" } ] }, inputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy API Key while keeping invalid APIKey, uniqueIdentifier=TC_PMS_GetPolicyForApiKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyForApiKey_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}, role=partner, templateFields=null, input={ "partnerId": "fqgfg", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$" }, output={ "errors": [ { "errorCode": "PMS_PMP_009" } ] }, inputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKey, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy API Key while keeping invalid PartnerId, uniqueIdentifier=TC_PMS_GetPolicyForApiKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPolicyForApiKey_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$" }, output={ "partnerID": "pms-111999" }, inputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKey, outputTemplate=pms/GetPolicyForApiKey/getPolicyForApiKeyResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Retrieve Partner Policy API Key, uniqueIdentifier=TC_PMS_GetPolicyForApiKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyAgainstApiKey_allValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_For_Get_ApiKey_with_deactivated_sid_id$", "newPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKeyResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Against ApiKey with valid details, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_OldPolicyId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "asfbgt", "newPolicyID": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_50" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Against ApiKey with invalid OldPolicyId, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_apiKey, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "apiKey": "asvbgn", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "newPolicyID": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_50" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Against ApiKey with invalid ApiKey, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_newPolicyId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "pms-111999", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "newPolicyID": "INVALID", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_014" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Against ApiKey with invalid NewPolicyId, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyAgainstApiKey_invalid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/apikey/{apiKey}/policies, role=partner, templateFields=null, input={ "partnerId": "asgfdg", "apiKey": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "oldPolicyID": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "newPolicyID": "$ID:DefineDataSharePolicy_All_Valid_Smoke_sid_id$", "requesttime": "$TIMESTAMP$" }, output={ "errors": [ { "errorCode": "PMS_PMP_50" } ] }, inputTemplate=pms/UpdatePolicyAgainstApiKey/updatePolicyAgainstApiKey, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Against ApiKey with invalid PartnerId, uniqueIdentifier=TC_PMS_UpdatePolicyAgainstApiKey_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=SELECT module_name,cr_by FROM audit.app_audit_log where module_name LIKE '%partner%' order by action_dtimes desc LIMIT 5, role=audit, templateFields=[partnerQuery, partner service], input={ }, output={ "module_name": "partner service" "cr_by": "111997" }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get the AuditLogs for add contact scenario, uniqueIdentifier=TC_PMS_addContact_01 |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroupForPartner_AllValid_smoke, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "updatepolicy", "policygroupName": "mosip policy group" }, output={ "response": "$IGNORE$" }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartnerResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group For Partner with valid data, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroupForPartner_InValid_ApprovedPartner, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "pms-111998", "policygroupName": "mosip policy group 19234" }, output={ "errors": [ { "errorCode": "PMS_PRT_050" } ] }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group For Partner with invalid Approved Partner, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroupForPartner_InValid_PolicyGroup, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "updatepolicy", "policygroupName": "dsfgeagb" }, output={ "errors": [ { "errorCode": "PMS_PRT_002" } ] }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group For Partner with invalid Policy GroupId, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdatePolicyGroupForPartner_InValid_partnerId, endPoint=/v1/partnermanager/partners/{partnerId}/policygroup/{policygroupName}, role=partner, templateFields=null, input={ "partnerId": "asfvgb", "policygroupName": "mosip policy group updated" }, output={ "errors": [ { "errorCode": "PMS_PRT_005" } ] }, inputTemplate=pms/UpdatePolicyGroupForPartner/updatePolicyGroupForPartner, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Policy Group For Partner with invalid PartnerId, uniqueIdentifier=TC_PMS_UpdatePolicyGroupForPartner_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_AddContact_All_Valid_Smoke, endPoint=SELECT module_name,cr_by FROM audit.app_audit_log where module_name LIKE '%partner%' order by action_dtimes desc LIMIT 5, role=audit, templateFields=[partnerQuery, partner service], input={ }, output={ "module_name": "partner service" "cr_by": "111997" }, inputTemplate=pms/authPartner/AddContacts/addContact, outputTemplate=pms/authPartner/AddContacts/addContactResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get the AuditLogs for add contact scenario, uniqueIdentifier=TC_PMS_addContact_01 |
| Testcase Input |
|---|
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_APIKEY, endPoint=SELECT * FROM ida.api_key_data where, role=partner, templateFields=null, input={ "partner_id": "$REMOVE$", "policy_name": "$REMOVE$", "api_key_id": "$ID:GenerateApiKeysforApprovedPolicies_AllValid_smoke_sid_apiKey$", "license_key": "$REMOVE$" }, output={ "module_name": "partner service", "cr_by": "Tech-123" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data in database using APIKEY with valid details, uniqueIdentifier=TC_PMS_DBValidator_03 |
| Testcase Input |
|---|
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_Misp, endPoint=SELECT * FROM ida.misp_license_data where, role=partner, templateFields=null, input={ "partner_id": "$REMOVE$", "policy_name": "$REMOVE$", "api_key_id": "$REMOVE$", "license_key": "$ID:CreateMispLicense_MispLicense_allValid_smoke_sid_licenseKey$" }, output={ "module_name": "partner service", "cr_by": "partner-111997" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data in database using MISPLicense with valid details, uniqueIdentifier=TC_PMS_DBValidator_04 |
| Testcase Input |
|---|
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_PMS, endPoint=SELECT * FROM ida.partner_data where, role=partner, templateFields=null, input={ "partner_id": "pms-111999", "policy_name": "$REMOVE$", "api_key_id": "$REMOVE$", "license_key": "$REMOVE$" }, output={ "module_name": "partner service", "cr_by": "111997" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data in database using PMS with valid details, uniqueIdentifier=TC_PMS_DBValidator_01 |
| Testcase Input |
|---|
| testCaseName=Pms_DBValidator_All_Valid_Smoke_data_created_using_Policy, endPoint=SELECT * FROM ida.policy_data where, role=partner, templateFields=null, input={ "partner_id": "$REMOVE$", "policy_name": "mosip data share policy", "api_key_id": "$REMOVE$", "license_key": "$REMOVE$" }, output={ "module_name": "partner service", "cr_by": "111997" }, inputTemplate=pms/DbValidatorTest/dbValidatorTest, outputTemplate=pms/DbValidatorTest/DbValidatorResult, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Create Data in database using Policy with valid details, uniqueIdentifier=TC_PMS_DBValidator_02 |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid_id$", "status": "De-Activate" }, output={ }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/DeactivateDevice/DeactivateDeviceResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device, uniqueIdentifier=TC_PMS_DeactivateDevice_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_Already_deactivated_device_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProviderForDeactivate_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_014" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device which has been already Deactivated, uniqueIdentifier=TC_PMS_DeactivateDevice_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_Empty_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$REMOVE$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device while keeping requestTime paramter as Empty, uniqueIdentifier=TC_PMS_DeactivateDevice_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_Missing_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device while keeping requestTime paramter as Missing, uniqueIdentifier=TC_PMS_DeactivateDevice_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Empty_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.device.patch", "version": "$REMOVE$", "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDeviceNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device while keeping Version parameter as Empty, uniqueIdentifier=TC_PMS_DeactivateDevice_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_Device_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "APPLE1111222" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passing invalid Device ID, uniqueIdentifier=TC_PMS_DeactivateDevice_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_RandomDevice_ID_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "00001111222" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passwing invalid Random Device ID, uniqueIdentifier=TC_PMS_DeactivateDevice_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_Version_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.device.patch", "version": "99", "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDeviceNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passing invalid Version, uniqueIdentifier=TC_PMS_DeactivateDevice_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_with_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=partnerdevice, templateFields=null, input={ "requesttime": "1111-07-22T08:21:17.665Z", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device by passing invalid requestTime, uniqueIdentifier=TC_PMS_DeactivateDevice_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateDevice_without_authentication_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceId}, role=invalidtoken, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "deviceId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateDevice/DeactivateDevice, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device without Partner authentication, uniqueIdentifier=TC_PMS_DeactivateDevice_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_all_Valid_Smoke, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI along with Associated Devices, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Already_deactivated_SBI_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_020" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI which already Deactivated in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping ID parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Empty_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping requestTime parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_InvalidNumeric_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "0101022" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Invalid Numeric values in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "JSKSKA56888", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI by passing Invalid ID parameter in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "APPLEMANCAP" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Invalid values in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as invalid value 0 in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as invalid value 1 in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_VersionValue_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "9977", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as invalid values in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "1111-07-22T08:21:17.665Z", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Request Time parameter as invalid in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Keeping_IDas_Null_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "Null", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping ID parameter as Null in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping ID parameter as Missing in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "$REMOVE$", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI without Version parameter in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Missing_requestTime_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "requesttime": "$REMOVE$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping requestTime parameter as Missing in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Null_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "Null" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_005" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Null in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Null_Version_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "Null", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping Version parameter as Null in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Space_SBI_ID_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=partnerdevice, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": " " }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI while keeping SBI ID parameter as Empty in request, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_Without_Authentication_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=invalidtoken, templateFields=null, input={ "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevices, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI with associated Devices without Partner authentication, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateSBIWithAssociatedDevices_with_invalid_roles_Neg, endPoint=/v1/partnermanager/securebiometricinterface/{sbiId}, role=device, templateFields=null, input={ "id": "mosip.pms.deactivate.sbi.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "sbiId": "$ID:SaveSecureBiometricInterfaceCreateDto_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivateSBIWithAssociatedDevices/DeactivateSBIWithAssociatedDevicesNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate SBI with invalid Partner roles, uniqueIdentifier=TC_PMS_DeactivateSBIWithAssociatedDevices_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_ApproveMappingDeviceToSbi_whenSBIisDeactivated_Neg, endPoint=/v1/partnermanager/devicedetail/{deviceDetailId}/approval, role=partneradmin, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "partnerId": "pms-111998", "sbiId": "$ID:SaveSecureBiometricInterface_All_Valid_Smoke_sid_id$", "deviceDetailId": "$ID:SaveDeviceDetails_DeviceProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_DEVICE_ERROR_029" } ] }, inputTemplate=pms/ApproveMappingDeviceToSbi/ApproveMappingDeviceToSbi, outputTemplate=pms/error, restMethod=post, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Approve Mapping Device To Sbi when SBI is Deactivated, uniqueIdentifier=TC_PMS_ApproveMappingDevice_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_all_Valid_Smoke_sid, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "status": "approved", "isActive": true }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/DeactivateFtm/DeactivateFtmResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Device with valid Partner authentication, uniqueIdentifier=TC_PMS_DeactivateFtm_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Already_Deactivate_FTM_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_007" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivating the FTM which is already Deactivated and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "" }, output={ "responseCode": "404" }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Empty and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_Req_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM keeping ID parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Empty_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestTime parameter as Empty in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_Values_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "Apple0192938838" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Invalid values and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_VersionValue0_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid value 0 in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_VersionValue1_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid value 1 in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_Version_Num_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "9977", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as invalid values in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Invalid_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "1111-07-22T08:21:17.665Z", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Request Time parameter as invalid in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Keeping_Req_IDas_Null_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "Null", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestID parameter as Null in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Missing_Req_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM with the requestID parameter missing in the request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Missing_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Missing in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Missing_requestTime_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$REMOVE$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping requestTime parameter as Missing in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Null_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": "Null" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_005" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Null and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_Null_Version_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "Null", "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM while keeping Version parameter as Null in request and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_with_SpaceValue_FTM_ID_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.deactivate.ftm.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "ftmId": " " }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivateFtm/DeactivateFtmNegativeScenarios, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate the FTM while keeping FTM ID parameter as Missing and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivateFtm_without_Authentication_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}, role=invalidtoken, templateFields=null, input={ "requestTime": "$TIMESTAMP$", "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivateFtm/DeactivateFtm, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate FTM without Partner authentication and expecting an error in the response, uniqueIdentifier=TC_PMS_DeactivateFtmNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetOriginalFtmCertifacte_AfterDeactiveFtm_Neg, endPoint=/v1/partnermanager/ftpchipdetail/{ftmId}/certificate-data, role=partnerftm, templateFields=null, input={ "ftmId": "$ID:CreateFtmChipDetails_FtmProvider_AllValid_Smoke_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_FTM_ERROR_009", "message": "Cannot download the certificate for a deactivated FTM" } ] }, inputTemplate=pms/GetOriginalFtmCertifacteAfterDeactiveFtm/GetOriginalFtmCertifacteAfterDeactiveFtm, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Original Ftm Certifacte After Deactivate Ftm, uniqueIdentifier=TC_PMS_GetOriginalFtmCertifacteAfterDeactiveFtm_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_After_Publish_All_Valid_Smoke, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output= { }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/DeactivatePolicy/DeactivatePolicyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy, uniqueIdentifier=TC_PMS_deactivate_policy_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_WithRejectedPolicy_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_For_Reject_Policy_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output= { }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/DeactivatePolicy/DeactivatePolicyResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with rejected policy, uniqueIdentifier=TC_PMS_deactivate_policy_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_already_deactivated, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_062" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy which is already deactiavted, uniqueIdentifier=TC_PMS_deactivate_policy_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_invalid_policyId, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "hhggtt567", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_065" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with invalid policyid, uniqueIdentifier=TC_PMS_deactivate_policy_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_invalid_policyId_spaces, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": " ", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with only spaces as policyid, uniqueIdentifier=TC_PMS_deactivate_policy_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_invalid_roles, endPoint=/v1/policymanager/policies/{policyId}, role=POLICYMANAGER, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy authenticated with invalid roles, uniqueIdentifier=TC_PMS_deactivate_policy_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_with_DraftPolicy_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_For_Draft_Policy_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_072" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with draft policy requests, uniqueIdentifier=TC_PMS_deactivate_policy_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_with_InProgressPolicy_Neg, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_For_InProgressMapping_Policy_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_064" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with draft policy requests, uniqueIdentifier=TC_PMS_deactivate_policy_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_with_approved_policyrequests, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_POL_063" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy with approved policy requests, uniqueIdentifier=TC_PMS_deactivate_policy_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_authentication, endPoint=/v1/policymanager/policies/{policyId}, role=invalidtoken, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without authentication, uniqueIdentifier=TC_PMS_deactivate_policy_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_id, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "$REMOVE$", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without id, uniqueIdentifier=TC_PMS_deactivate_policy_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_requestime, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$REMOVE$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "1.0" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicy_without_version, endPoint=/v1/policymanager/policies/{policyId}, role=partneradmin, templateFields=null, input={ "policyId": "$ID:DefinePolicy_All_Valid_Smoke_For_Deactive_pms_sid_id$", "requestTime": "$TIMESTAMP$", "status": "De-Activate", "id": "mosip.pms.deactivate.policy.patch", "version": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicy/DeactivatePolicy, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate policy without version, uniqueIdentifier=TC_PMS_deactivate_policy_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_All_Valid_Smoke, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output= { "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group, uniqueIdentifier=TC_PMS_deactivate_policy_group_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_future_date_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "2026-01-24T07:47:57.206Z", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with future date given as requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_group_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_id_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.deactiavte", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with invalid id value, uniqueIdentifier=TC_PMS_deactivate_policy_group_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_policygroupid_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "6776654" }, output={ "errors": [ { "errorCode": "PMS_POL_068" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group invalid policygroupid, uniqueIdentifier=TC_PMS_deactivate_policy_group_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_roles_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=POLICYMANAGER, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group authenticated using invalid roles, uniqueIdentifier=TC_PMS_deactivate_policy_group_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_status_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_073" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with invalid status, uniqueIdentifier=TC_PMS_deactivate_policy_group_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_invalid_version_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "2.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group invalid version, uniqueIdentifier=TC_PMS_deactivate_policy_group_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_past_date_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "2024-01-24T07:47:57.206Z", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_006" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with past date given as requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_group_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_spacevalue_policygroupid_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": " " }, output={ "responseCode": "400" }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/responseCode, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=true, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without policygroupid, uniqueIdentifier=TC_PMS_deactivate_policy_group_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_with_Draftpolicy_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_ForDraftPolicy_pms_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_070" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with draft policy, uniqueIdentifier=TC_PMS_deactivate_policy_group_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_with_deactivated_policies, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid_id$" }, output={ "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_Smoke_ForDeactivatePolicy_pms_sid_id$", "isActive": false }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroupResult, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with deactivated policies, uniqueIdentifier=TC_PMS_deactivate_policy_group_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_with_publishpolicy_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_All_Valid_ForPublishedPolicy_pms_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_056" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group with published policy, uniqueIdentifier=TC_PMS_deactivate_policy_group_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_authentication_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=invalidtoken, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without authentication, uniqueIdentifier=TC_PMS_deactivate_policy_group_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_id_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "$REMOVE$", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without id value, uniqueIdentifier=TC_PMS_deactivate_policy_group_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_requesttime_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$REMOVE$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without requesttime, uniqueIdentifier=TC_PMS_deactivate_policy_group_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_status_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "$REMOVE$", "id": "mosip.pms.deactivate.policy.group.patch", "version": "1.0", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_POL_073" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without status, uniqueIdentifier=TC_PMS_deactivate_policy_group_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DeactivatePolicyGroup_without_version_neg, endPoint=/v1/policymanager/policies/group/{policyGroupId}, role=partneradmin, templateFields=null, input={ "status": "De-Activate", "id": "mosip.pms.deactivate.policy.group.patch", "version": "$REMOVE$", "requestTime": "$TIMESTAMP$", "policyGroupId": "$ID:DefinePolicyGroup_create_then_All_Valid_Smoke_pms_deactivate_sid_id$" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DeactivatePolicyGroup/deactivatePolicyGroup, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Deactivate Policy Group without version, uniqueIdentifier=TC_PMS_deactivate_policy_group_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_GetAllNotifications_UsingPartnerToken_FilteredByNotificationTypeRoot_Neg, endPoint=/v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4, role=partnerftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_006" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by using Partner Token and filtered by Notification Type Root, uniqueIdentifier=TC_PMS_GetAllNotifications_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=PMS_GetAllNotifications_by_filtering_CertificateID_without_selecting_NotificatioType_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&certificateId=fd0e8be0-9499-448e-9b85-06d5649c3f0e, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering CertificateID without selecting NotificatioType filter, uniqueIdentifier=TC_PMS_GetAllNotifications_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_All_Valid_Smoke, endPoint=/v1/partnermanager/notifications, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Different_Time_Format_Created_From_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=07-04-2025, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_025" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering different format Created From Date, uniqueIdentifier=TC_PMS_GetAllNotifications_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Different_Time_Format_Created_To_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=07-04-2025, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_026" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering different format Created To Date, uniqueIdentifier=TC_PMS_GetAllNotifications_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Different_Time_Format_Expiry_Date, endPoint=/v1/partnermanager/notifications?pageSize=16&expiryDate=07-04-2025, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_016" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering different format Expiry Date, uniqueIdentifier=TC_PMS_GetAllNotifications_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_ApiKey_Invalid_ftmChipType_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&apiKeyName=12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_020" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications by selecting Api key name label and selecting NotificationType as ftmChip, uniqueIdentifier=TC_PMS_GetAllNotifications_38 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Invalid_NotificationType_invalid_partnerDomain_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&partnerDomain=AUTH, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_021" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications by selecting sbi Id and selecting NotificationType as ftmChip, uniqueIdentifier=TC_PMS_GetAllNotifications_41 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_PageNo_2_Neg, endPoint=/v1/partnermanager/notifications?pageSize=2, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsPageNoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all notifications invalid PageNo, uniqueIdentifier=TC_PMS_GetAllNotifications_35 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Page_Size4_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering page size 4, uniqueIdentifier=TC_PMS_GetAllNotifications_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Page_Size8_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=8, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering page size 4, uniqueIdentifier=TC_PMS_GetAllNotifications_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Root_Certificates_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only Root certificate notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_SbiID_without_notificationType_Neg, endPoint=/v1/partnermanager/notifications?sbiId=PMS-SBI, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all ftmChip without selecting notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_32 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Status_Active_Notifications, endPoint=/v1/partnermanager/notifications?notificationStatus=active&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only Active certificate notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Status_Dismissed_Notifications, endPoint=/v1/partnermanager/notifications?notificationStatus=active&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only Dismissed certificate notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_20 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_Weekly_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=weekly&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only Weekly summary notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_ftmChip_Invalid_apikeyType_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&ftmId=12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_022" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications by selecting ftmChip Id and selecting NotificationType as sbi, uniqueIdentifier=TC_PMS_GetAllNotifications_39 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_ftmChip_without_notificationType_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all ftmChip without selecting notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_30 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_PageNo_Neg, endPoint=/v1/partnermanager/notifications?pageNo=-4, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications with invalid pageNo, uniqueIdentifier=TC_PMS_GetAllNotifications_36 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_PageSize_Neg, endPoint=/v1/partnermanager/notifications?pageSize=-22, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications with invalid pageNo, uniqueIdentifier=TC_PMS_GetAllNotifications_37 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_SbiID_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all SBI Chip with invalid data, uniqueIdentifier=TC_PMS_GetAllNotifications_31 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_SbiVersionValues_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=_%2ASBI, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all SBI Chip with invalid SBI Version data, uniqueIdentifier=TC_PMS_GetAllNotifications_34 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_SbiVersion_Neg, endPoint=/v1/partnermanager/notifications?notificationType=sbi&sbiId=PMS-SBI&sbiVersion=ab-102-13881, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all SBI Chip with invalid SBI Version data, uniqueIdentifier=TC_PMS_GetAllNotifications_33 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_ftmId_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&ftmId=342342, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all FTM Chip with invalid data, uniqueIdentifier=TC_PMS_GetAllNotifications_28 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_make_model_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&pageNo=0&pageSize=4&ftmId=ftm-1212&make=ftm-1212&model=ftm-1212, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsTotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all ftmChip with make & model data, uniqueIdentifier=TC_PMS_GetAllNotifications_29 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_invalid_policyName_Neg, endPoint=/v1/partnermanager/notifications?policyName=PMS-test, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all policyName with invalid data, uniqueIdentifier=TC_PMS_GetAllNotifications_27 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_policyName_invalid_notificationType_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&policyName=PMS-test, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_020" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all policyName by selecting invalid notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_26 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_policyName_without_notificationType_Neg, endPoint=/v1/partnermanager/notifications?policyName=PMS-test, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all policyName without selecting notificationType, uniqueIdentifier=TC_PMS_GetAllNotifications_25 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Filter_sbiId_Invalid_ftmChip_Neg, endPoint=/v1/partnermanager/notifications?notificationType=ftm-chip&sbiId=12, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_023" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all Notifications by selecting sbi Id and selecting NotificationType as ftmChip, uniqueIdentifier=TC_PMS_GetAllNotifications_40 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_For_IntermediateType_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=weekly&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only IntermediateType certificate notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_23 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_For_RootType_Notifications, endPoint=/v1/partnermanager/notifications?notificationType=root&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output= { }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/GetAllNotifications/GetAllNotificationsResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering only RootType certificate notifications, uniqueIdentifier=TC_PMS_GetAllNotifications_21 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Invalid_Certificate_ID_Neg, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=8&certificateId=777apple123, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering invalid certificate ID, uniqueIdentifier=TC_PMS_GetAllNotifications_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Invalid_Created_From_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdFromDate=123456, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_025" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering invalid Created From Date, uniqueIdentifier=TC_PMS_GetAllNotifications_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Invalid_Created_To_Date, endPoint=/v1/partnermanager/notifications?pageNo=0&pageSize=4&createdToDate=928382, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_026" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering invalid Created To Date, uniqueIdentifier=TC_PMS_GetAllNotifications_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_Invalid_Expiry_Date, endPoint=/v1/partnermanager/notifications?pageSize=16&expiryDate=881718821, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_016" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering invalid Expiry Date, uniqueIdentifier=TC_PMS_GetAllNotifications_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_by_filtering_IssuedBy_without_selecting_NotificatioType_Neg, endPoint=/v1/partnermanager/notifications?pageSize=16&issuedBy=mosip, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering IssuedBy without selecting NotificatioType filter, uniqueIdentifier=TC_PMS_GetAllNotifications_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_by_filtering_IssuedTo_without_selecting_NotificatioType_Neg, endPoint=/v1/partnermanager/notifications?pageSize=4&issuedTo=mosip, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_015" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications by filtering IssuedTo without selecting NotificatioType filter, uniqueIdentifier=TC_PMS_GetAllNotifications_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_invalid_apiKeyName_Neg, endPoint=/v1/partnermanager/notifications?notificationType=apikey&apiKeyName=%2APMS121, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetch all API key expiry notifications that with invalid API key name, uniqueIdentifier=TC_PMS_GetAllNotifications_24 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_without_Authorization_Token_Neg, endPoint=/v1/partnermanager/notifications, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications without Authorization Token, uniqueIdentifier=TC_PMS_GetAllNotifications_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllNotifications_without_Partner_Admin_Role_Neg, endPoint=/v1/partnermanager/notifications, role=auth, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllNotifications/GetAllNotifications, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get All Notifications without partner admin role, uniqueIdentifier=TC_PMS_GetAllNotifications_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Empty_Notification_Status_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_012" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Empty Notification Status, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Empty_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Empty Request ID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1", "requesttime": "", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Empty Request Time param, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_NotificationID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": "fd0e8", "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_008" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Invalid NotificationID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_Notification_Status_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "CANCEL" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_012" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with invalid Notification status, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_Param_Dismiss_Notification_Status_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "DISMISS" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_012" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with invalid Notification Status parameter as DISMISS, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_19 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with invalid Request ID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_Value_0_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Version value 0 parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_Value_1_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Version value 1 parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Invalid_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "12345", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Version parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Null_NotificationID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": "NULL", "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_008" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Null NotificationID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Null_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Null Request ID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Null_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "Null", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Version parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Without_Authentication_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": "fd0e8be0-9499-448e-9b85-06d5649c3f0e", "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification without Authentication, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Without_RequestID_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification without Request ID, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_Without_Version_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification with Version parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_without_Object_Parameter_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": notificationId, "notificationStatus": "$REMOVE$" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_019" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification without object Parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_without_PartnerAdmin_Role_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=auth, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification without Partner Admin role, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_DismissNotification_without_RequestTime_Neg, endPoint=/v1/partnermanager/notifications/{notificationId}, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.dismiss.notification.patch", "version": "1.0", "notificationId": $NOTIFICATIONID$, "notificationStatus": "DISMISSED" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/DismissNotification/DismissNotification, outputTemplate=pms/error, restMethod=patch, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Dismiss Notification without RequestTime parameter, uniqueIdentifier=TC_PMS_DismissNotificationNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_All_Valid_Smoke, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestampResult, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with valid details, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestamp_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Empty_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Empty RequestId param, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Empty_RequestTime_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": " ", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Empty RequestTime, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Empty_notificationsSeenDtimes_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": " ", "userId": "pms-111999" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Empty notificationsSeenDtimes parameter, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_Partner_Admin_Role_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=auth, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with Invalid partner admin role, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_17 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with Invalid RequestId param, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_Version_Value_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1010", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Invalid Version value, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Invalid_userId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "base-admin" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with invalid userID, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Null_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "Null", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Null RequestId param, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Null_Version_Value_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "Null", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Null Version value, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Null_userId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "Null" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with Null userID, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Version_Value0_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Version value0, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Version_Value1_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp Version value1, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Without_Authentication_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=invalidtoken, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp without Authentication, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_Without_Version_Value_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_003" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp without Version value, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_with_Partner_Role_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partnerftm, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp with Invalid partner admin role, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_18 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_without_Object_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "$REMOVE$", "userId": "pms-111999" }, output={ "errors": [ { "errorCode": "PMS_NOTIFICATION_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp without Object parameter, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_without_RequestId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "version": "1.0", "requesttime": "$TIMESTAMP$", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_002" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp without RequestId param, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_UpdateNotificationSeenTimestamp_without_RequestTime_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "id": "mosip.pms.users.notifications.seen.timestamp.put", "version": "1.0", "notificationsSeenDtimes": "2025-06-04T10:00:00Z", "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_004" } ] }, inputTemplate=pms/UpdateNotificationSeenTimestamp/UpdateNotificationSeenTimestamp, outputTemplate=pms/error, restMethod=put, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Update Notification Seen Timestamp without RequestTime, uniqueIdentifier=TC_PMS_UpdateNotificationSeenTimestampNegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetNotificationsSeenTimestamp_All_Valid_Smoke, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "userId": "pms-111999" }, output= { }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestampResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Notifications Seen Timestamp, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestamp_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetNotificationsSeenTimestampNegativeScenarios_Invalid_userId_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=partneradmin, templateFields=null, input={ "userId": "base-admin" }, output={ "errors": [ { "errorCode": "PMS_CERTIFICATE_ERROR_002" } ] }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Notifications Seen Timestamp with invalid userId, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetNotificationsSeenTimestampNegativeScenarios_with_InvalidToken_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=invalidtoken, templateFields=null, input={ "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Notifications Seen Timestamp with invalid token, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetNotificationsSeenTimestampNegativeScenarios_without_AdminRole_Neg, endPoint=/v1/partnermanager/users/{userId}/notifications-seen-timestamp, role=auth, templateFields=null, input={ "userId": "pms-111777" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetNotificationsSeenTimestamp/GetNotificationsSeenTimestamp, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Notifications Seen Timestamp without Adminrole, uniqueIdentifier=TC_PMS_GetNotificationsSeenTimestampNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "30" }, output={ "partnerId": "pms-111998", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificates, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificate_Expiry_Date_10_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "10" }, output={ "partnerId": "pms-111998", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificate with Expiry date 10 days, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificate_Expiry_Date_15_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "15" }, output={ "partnerId": "pms-111998", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificate with Expiry date 15 days, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificate_Expiry_Days_30_Smoke, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=partnerdevice, templateFields=null, input={ "expiryPeriod": "30" }, output={ "partnerId": "pms-111998", "partnerType": "Device_Provider", "isCertificateAvailable": true }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificate with Expiry date 30 days, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificate_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Role_Neg, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=device, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificates with invalid Role, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Token_Neg, endPoint=/v1/partnermanager/partners/partner-certificates-details, role=invalidtoken, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetPartnerExpiringCertificate/GetPartnerExpiringCertificate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Partner Expiring Certificates with invalid token, uniqueIdentifier=TC_PMS_GetPartnerExpiringCertificateNegativeScenariosNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_All_Valid_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "30" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root and Intermediate Expiring Certificates, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_10_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "10" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root and Intermediate Expiring Certificates, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_15_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "15" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root and Intermediate Expiring Certificates, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRootIntermediateExpiringCertificate_Expiry_Date_30_Smoke, endPoint=/v1/partnermanager/trust-chain-certificates, role=partneradmin, templateFields=null, input={ "expiryPeriod": "30" }, output={ "status": true }, inputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificate, outputTemplate=pms/GetRootIntermediateExpiringCertificate/GetRootIntermediateExpiringCertificateResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root and Intermediate Expiring Certificates, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificate_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetPartnerExpiringCertificateNegativeScenarios_Invalid_Token_Neg, endPoint=/v1/partnermanager/trust-chain-certificates, role=invalidtoken, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetRootIntermediateExpiringCertificateRootIntermediate/GetRootIntermediateExpiringCertificateRootIntermediate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root Intermediate Expiring Certificates with invalid token, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetRootIntermediateExpiringCertificateNegativeScenarios_Partner_Role_Neg, endPoint=/v1/partnermanager/trust-chain-certificates, role=partnerftm, templateFields=null, input={ "expiryPeriod": "30" }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetRootIntermediateExpiringCertificateRootIntermediate/GetRootIntermediateExpiringCertificateRootIntermediate, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Get Root Intermediate Expiring Certificates with Partner Role, uniqueIdentifier=TC_PMS_GetRootIntermediateExpiringCertificateNegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartnerV2_All_Valid_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner by Partner Admin token, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_01 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Auth_Partner_Token_Smoke, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerauth, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_ByPageNo, endPoint=/v1/partnermanager/partner-api-keys/v2?pageNo=2&pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "2" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2PageNoResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by pageNo, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_10_days, endPoint=/v1/partnermanager/partner-api-keys/v2?expiryPeriod=10, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Expiry period 10 days, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_16 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_15_days, endPoint=/v1/partnermanager/partner-api-keys/v2?expiryPeriod=15, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Expiry period 15 days, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_15 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Expiry_Period_30_days, endPoint=/v1/partnermanager/partner-api-keys/v2?expiryPeriod=30, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Expiry period 30 days, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Status_Activated, endPoint=/v1/partnermanager/partner-api-keys/v2?status=activated, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Status Activated, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_Status_Dectivated, endPoint=/v1/partnermanager/partner-api-keys/v2?status=deactivated, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Status Deactivated, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_apiKeyLabel, endPoint=/v1/partnermanager/partner-api-keys/v2?apiKeyLabel=s, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by apiKeyLabel, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_orgName, endPoint=/v1/partnermanager/partner-api-keys/v2?orgName=PMS, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by orgName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_pageSize, endPoint=/v1/partnermanager/partner-api-keys/v2?orgName=PMS, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by pageSize, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_partnerID, endPoint=/v1/partnermanager/partner-api-keys/v2?partnerId=pms-111999, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by partnerId, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_policyGroupName, endPoint=/v1/partnermanager/partner-api-keys/v2?policyGroupName=mosip, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by policyGroupName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_policyName, endPoint=/v1/partnermanager/partner-api-keys/v2?policyName=mosip, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by policyName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_sortFieldName_sortType_ASC, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=asc&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by sortFieldName and sortType Ascending, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_sortFieldName_sortType_DESC, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=partnerId&sortType=desc&pageNo=0&pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "pageNo": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerResultV2, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=true, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by sortFieldName and sortType Descending, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_DevicePartner_Token_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerdevice, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Device Partner token, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_02 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_FTMPartner_Token_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=partnerftm, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by FTM Partner token, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_03 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Filter_WithoutPageNo_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?pageSize=4, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_006" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_14 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invaid_Role_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=admin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-403" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_13 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_apiKeyLabel_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?apiKeyLabel=InvalidAPIKey, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2TotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid apiKeyLabel, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_04 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_orgName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?orgName=%2APMS-1100, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid orgName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_05 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_pageNo_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?pageNo=-22&pageSize=2, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_360" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid pageNo, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_06 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_pageSize_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?pageNo=1&pageSize=-1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_361" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid pageSize, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_07 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_partnerID_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?partnerId=%252APMS, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_REQUEST_ERROR_007" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid partnerId, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_08 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_policyGroupName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?policyGroupName=testmosip12121, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2TotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid policyGroupName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_09 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_policyName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?policyName=testmosip1212, role=partneradmin, templateFields=null, input={ }, output={ "totalResults": "0" }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2TotalResultResult, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by Invalid policyName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_10 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_sortFieldName_1_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=_partnerID&sortType=asc&pageNo=1&pageSize=1, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PRT_357" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by invalid sortFieldName, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_12 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_Invalid_sortFieldName_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2?sortFieldName=MOSIP_PMS, role=partneradmin, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "PMS_PS_ERROR_007" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner Filter by sortFieldName and without selecting pageno & pageSize, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_11 |
| Messages |
| Testcase Input |
|---|
| testCaseName=Pms_GetAllApiKeyForAuthPartner_without_Authentication_Neg, endPoint=/v1/partnermanager/partner-api-keys/v2, role=invalidtoken, templateFields=null, input={ }, output={ "errors": [ { "errorCode": "KER-ATH-401" } ] }, inputTemplate=pms/GetAllApiKeyForAuthPartnerV2/GetAllApiKeyForAuthPartnerV2, outputTemplate=pms/error, restMethod=get, regenerateHbs=false, validityCheckRequired=false, auditLogCheck=false, checkErrorsOnlyInResponse=false, checkOnlyStatusCodeInResponse=false, allowedErrorCodes=null, kycFields=null, description=Fetching all the API Key created by Authentication Partner without Authentication for Partner Admin, uniqueIdentifier=TC_PMS_GetAllApiKeyForAuthPartnerV2NegativeScenarios_01 |
| Messages |